Slack Audit (using Azure Functions) connector for Microsoft Sentinel

The Slack Audit data connector provides the capability to ingest Slack Audit Records events into Microsoft Sentinel through the REST API. Refer to API documentation for more information. The connector provides ability to get events which helps to examine potential security risks, analyze your team's use of collaboration, diagnose configuration problems and more.

Connector attributes

Connector attribute Description
Kusto function alias SlackAudit
Kusto function url https://aka.ms/sentinel-SlackAuditAPI-parser
Log Analytics table(s) SlackAudit_CL
Data collection rules support Not currently supported
Supported by Microsoft Corporation

Query samples

Slack Audit Events - All Activities.

SlackAudit

| sort by TimeGenerated desc

Prerequisites

To integrate with Slack Audit (using Azure Functions) make sure you have:

Vendor installation instructions

Note

This connector uses Azure Functions to connect to the Slack REST API to pull its logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the Azure Functions pricing page for details.

(Optional Step) Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. Follow these instructions to use Azure Key Vault with an Azure Function App.

Note

This data connector depends on a parser based on a Kusto Function to work as expected. Follow these steps to create the Kusto functions alias, SlackAudit

STEP 1 - Configuration steps for the Slack API

Follow the instructions to obtain the credentials.

STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function

IMPORTANT: Before deploying the Slack Audit data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).

Next steps

For more information, go to the related solution in the Azure Marketplace.