Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | VirtualMetricDirectorProxy |
| Publisher | VirtualMetric |
| Used in Solutions | VirtualMetric DataStream |
| Collection Method | Azure Function |
| Connector Definition Files | Template_DirectorProxy.json |
| Ingestion API | HTTP Data Collector API — Connector definition requires workspace key (SharedKey pattern) |
VirtualMetric Director Proxy deploys an Azure Function App to securely bridge VirtualMetric DataStream with Azure services including Microsoft Sentinel, Azure Data Explorer, and Azure Storage.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
CommonSecurityLog |
✓ | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): read and write permissions are required. - Keys (Workspace): read permissions to shared keys for the workspace are required.
Custom Permissions: - Azure Function App: An Azure Function App must be deployed to host the Director Proxy. Requires read, write, and delete permissions on Microsoft.Web/sites resources within your resource group to create and manage the Function App. - VirtualMetric DataStream Configuration: You need VirtualMetric DataStream configured with authentication credentials to connect to the Director Proxy. The Director Proxy acts as a secure bridge between VirtualMetric DataStream and Azure services. - Target Azure Services: Configure your target Azure services such as Microsoft Sentinel Data Collection Endpoints, Azure Data Explorer clusters, or Azure Storage accounts where the Director Proxy will forward data.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
1. Deploy VirtualMetric Director Proxy
Deploy the Azure Function App that serves as a secure proxy between VirtualMetric DataStream and Microsoft Sentinel. Prerequisites and Deployment Order
Recommended Deployment Order:
For optimal configuration, consider deploying the target connectors first:
Deploy Microsoft Sentinel Connector: Deploy the VirtualMetric DataStream for Microsoft Sentinel connector first to create the required Data Collection Endpoints and Rules.
Deploy Microsoft Sentinel data lake Connector (optional): If using Microsoft Sentinel data lake tables, deploy the VirtualMetric DataStream for Microsoft Sentinel data lake connector.
Deploy Director Proxy (this step): The Director Proxy can then be configured with your Microsoft Sentinel targets.
Note: This order is recommended but not required. You can deploy the Director Proxy independently and configure it with your targets later.
Deploy Azure Function App
Deploy the VirtualMetric Director Proxy Azure Function App using the Deploy to Azure button.
Deploy to Azure:
- Click the Deploy to Azure button below to deploy the Function App:
-
Configure Deployment Parameters: - Subscription: Select your Azure subscription - Resource Group: Choose the same resource group as your Microsoft Sentinel workspace or create a new one - Region: Select the Azure region (should match your Microsoft Sentinel workspace region) - Function App Name: Provide a unique name for the Function App (e.g., "vmetric-director-proxy")
Complete Deployment:
- Click Review + create to validate the parameters
- Click Create to deploy the Function App
- Wait for deployment to complete (typically 3-5 minutes)
- Note the Function App URL: https://<function-app-name>.azurewebsites.net
Configure Function App Permissions
Assign the necessary permissions to the Function App's managed identity to access Microsoft Sentinel resources.
Enable System-Assigned Managed Identity: - Navigate to your deployed Function App in Azure Portal - Go to Identity under Settings - Toggle Status to On for System assigned identity - Click Save and confirm
Navigate to Resource Group: - Go to the resource group containing your Microsoft Sentinel workspace and Data Collection Endpoints
Assign Required Roles: - Open Access control (IAM) - Click + Add > Add role assignment - Assign the following roles to the Function App's system-assigned managed identity:
Select the Function App Identity: - In Members tab, select Managed identity - Choose Function App and select your deployed Director Proxy Function App - Complete the role assignment
Get Function App Access Token (Optional for Function Key authentication): - Navigate to your Function App - Go to App keys under Functions - Copy the default host key or create a new function key for authentication
Configure VirtualMetric DataStream Integration
Set up VirtualMetric DataStream to send security telemetry to Microsoft Sentinel through the Director Proxy.
Access VirtualMetric DataStream Configuration: - Log into your VirtualMetric DataStream management console - Navigate to Targets section - Click Microsoft Sentinel Targets - Click Add new target or edit an existing Microsoft Sentinel target
Configure General Settings: - Name: Enter a name for your target (e.g., "sentinel-with-proxy") - Description: Optionally provide a description for the target configuration
Configure Azure Authentication:
For Service Principal Authentication: - Managed Identity for Azure: Keep Disabled - Tenant ID: Enter your Azure Active Directory tenant ID - Client ID: Enter your service principal application ID - Client Secret: Enter your service principal client secret
For Azure Managed Identity: - Managed Identity for Azure: Set to Enabled
Configure Director Proxy (in Azure Properties tab):
- Endpoint Address: Enter the Function App URL from Step 2 (format: https://<function-app-name>.azurewebsites.net)
- Access Token: Enter the Function App host key from Step 3 (optional if using Managed Identity)
Configure Stream Properties:
- Endpoint: Enter the DCE Logs Ingestion URI (format: https://<dce-name>.<region>.ingest.monitor.azure.com)
- Streams: Select Auto for automatic stream detection, or configure specific streams if needed
Verify Data Ingestion in Microsoft Sentinel:
- Return to your Log Analytics Workspace
- Run sample queries to confirm data is being received:
kql
CommonSecurityLog
| where TimeGenerated > ago(1h)
| take 10
- Check the Microsoft Sentinel Overview dashboard for new data sources and event counts
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊