VMRay Connector to Microsoft Sentinel

Solution: VMRay

VMRay Logo

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index


Attribute Value
Publisher VMRay
Support Tier Partner
Support Link https://www.vmray.com/contact/customer-support/
Categories domains
Version 3.0.0
Author VMRay
First Published 2025-07-23
Solution Folder VMRay
Marketplace Azure Marketplace · Popularity: ⚪ Very Low (0%)

The VMRay Connector for Microsoft Sentinel enhances security operations by providing enriched threat intelligence, enabling faster and more informed responses to security incidents. The integration has two main parts: first, URL detonation and enrichment, which provides detailed insights into suspicious URLs. Second, it automatically generates and feeds threat intelligence for all submissions to VMRay, improving threat detection and incident response in Sentinel. This seamless integration empowers teams to proactively address emerging threats.

Contents

Data Connectors

This solution provides 1 data connector(s):

Tables Used

This solution uses 1 table(s):

Table Used By Connectors Used By Content
ThreatIntelligenceIndicator VMRayThreatIntelligence -

Content Items

This solution includes 2 content item(s):

Content Type Count
Playbooks 2

Playbooks

Name Description Tables Used
VMRay Email Attachment Analyis Submits a attachment or set of attachment associated with an office 365 email to VMRay for Analyis. -
VMRay URL Analyis Submits a url or set of urls associated with an incident to VMRay for Analyis. -

Additional Documentation

📄 Source: VMRay/README.md

VMRay Threat Intelligence Feed and Enrichment Integration - Microsoft Sentinel

Latest Version: 3.0.1 - Release Date: 2025-11-07

Overview

Requirements

VMRay Configurations

  1. Create a user dedicated for this API key (to avoid that the API key is deleted if an employee leaves)
  2. Create a role that allows to "View shared submission, analysis and sample" and "Submit sample, manage own jobs, reanalyse old analyses and regenerate analysis reports".
  3. Assign this role to the created user
  4. Login as this user and create an API key by opening Settings > Analysis > API Keys.
  5. Please save the keys, which will be used in configuring the Azure Function.

Microsoft Sentinel

Creating Application for API Access

01

02a

02

03

app_per

[Content truncated...]

Release Notes

Version Date Modified (DD-MM-YYYY) Change History
3.0.1 07-11-2025 Fixed Premium ARM template
3.0.0 23-07-2025 Initial Solution Release

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index