Overview
Azure Monitor and Microsoft Sentinel work together, with Sentinel built on top of Azure Monitor’s data collection and log management framework. Azure Monitor serves as the foundation, providing core components such as log analytics workspaces and the Azure Monitor Agent to collect and store data. Microsoft Sentinel then analyzes this data to deliver security information and event management (SIEM) capabilities, including threat detection, investigation, and response.
Zoho Vault supports seamless integration by streaming events directly to Azure Monitor log analytics workspace tables using the Azure Logs Ingestion API, enabling centralized monitoring and security analysis.
Note: As part of Azure’s ongoing modernization efforts, the legacy custom data collection API will be retired in
September 2026.
Learn more.
Setup instructions
Go to the Azure Portal to begin the setup.
Step 1: Create an app registration
To authenticate API requests to the Azure Logs Ingestion API, you need to create an Azure app registration.
- Navigate to App registrations in the Azure portal and click New registration.
- Complete the registration form:
- Name: ZohoVaultLogging
- Supported account types: Choose the default option (single tenant)
- Redirect URI: Leave this field blank
- Click Register.
- After the app is registered:
- Open the newly created application.
- Go to Expose an API.
- Click Add next to the Application ID URI.
- Accept and save the default suggested URI.
Step 2: Create a client secret
- In the Azure portal, navigate to App registrations and select your application.
- Go to Manage and click Certificates & secrets, then click New client secret.
- Enter a description and choose the desired expiration period.
- Click Add to generate the secret.
- Once created, copy the generated value immediately and store it securely in Zoho Vault. This value will be required later as the "Client Secret Value".
Finally, navigate to the Overview page of the application and make a note of the "Tenant ID" and "Display Name" for use in the configuration steps.
Info: Save the following for later:
1. Application (client) ID
2. Client secret ID
3. Client secret value
4. Directory (tenant) ID on the App registrations page.
Step 3: Create a log analytics workspace
A log analytics workspace serves as the main resource in Azure Monitor for gathering and retaining log data. If you already have an existing workspace, you can skip this step.
To create a new workspace:
- In the Azure portal, navigate to Log Analytics workspaces.
- Click Create and provide the following details:
- Subscription: Select your Azure subscription.
- Resource group: Choose an existing resource group or create a new one.
- Name: Enter a meaningful name (for example, ZohoVaultLogsWorkspace).
- Region: Select the appropriate region.
- Click Review + Create, then select Create to complete the setup.
Step 4: Assign a role to app registration
To allow the ZohoVaultLogging application to send data to your workspace, assign it the log analytics contributor role for the log analytics workspace.
- In the Azure portal, open your log analytics workspace (for example, ZohoVaultLogsWorkspace).
- Navigate to Access control (IAM) and select Role assignments.
- Click Add, then click Add role assignment.
- In the role search bar, type Log Analytics Contributor and select the role.
- Click + Select members, then choose the ZohoVaultLogging application from the list.
- Review the details and complete the role assignment to grant access.
Step 5: Create a data collection endpoint
Before creating a data collection rule (DCR), you must first set up a data collection endpoint (DCE).
Follow these steps to create one:
- In the Azure portal, search for Data Collection Endpoints and click Create.
- Configure the following details:
- Subscription: Select your Azure subscription.
- Resource Group: Choose the same resource group that you plan to use for the data collection rule.
- Region: Select the appropriate region.
- Name: Provide a meaningful name (for example, ZohoVaultLogsEndpoint).
- Review the configuration and complete the creation process.
After the endpoint is created, make a note of the "Logs Ingestion URL", because it will be required in the later configuration steps.
Step 6: Create a table and a DCR
To create a custom table for ingesting logs:
- In the Azure portal, open your log analytics workspace (for example, ZohoVaultLogsWorkspace).
- Under Settings, select Tables and click Create.
- Choose New custom log (Direct ingest).
- Enter a table name. In this example, we use ZohoVaultLogs.
- Create a new data collection rule when prompted.
- Save the JSON file below on your computer.
- When prompted, upload the JSON file below as a data sample:
- [
- {
- "Action": "Password Moved to Trash",
- "Ipaddress": "127.0.0.1",
- "TimeGenerated": "2025-12-15T07:06:12.557679Z",
- "PerformedBy": "Test User",
- "Reason": "Validating configuration",
- "Remarks":"Test Remarks"
- "Name": "Test Password"
- }
- ]
Review the configuration and submit the request to create the table.
Step 7: Assign app permissions to the DCR
To grant the required permissions for the data collection rule:
- In the Azure portal, navigate to Data collection rules and open your rule (for example, ZohoVaultDCR).
- Select Access control (IAM) and go to Role assignments.
- Click Add then select Add role assignment.
- Search for and select the Monitoring Metrics Publisher role.
- Click +Select members, choose the ZohoVaultLogging application from the list, and complete the assignment.
- Repeat this process and add "Monitoring Contributor" and "Monitoring Reader".
Step 8: Assign app permissions to the DCE
To grant the required permissions for the data collection endpoint:
- In the Azure portal, navigate to Data collection endpoints and open your endpoint (for example, ZohoVaultLogsEndpoint).
- Select Access control (IAM) and go to Role assignments.
- Click Add, then select Add role assignment.
- Search for and select the Monitoring Metrics Publisher role.
- Click Select members, choose the ZohoVaultLogging application from the list, and complete the assignment.
- Repeat the same steps to assign the "Monitoring Contributor" role to the ZohoVaultLogging application.
Once these roles are assigned, the Azure-side configuration is complete. You can now proceed to configure the integration from the Zoho Vault SIEM Console.
Step 9: Configuring MS Sentinel (DCR-based) in Zoho Vault
After completing the Azure configuration, you need to configure the integration in Zoho Vault to stream logs to Microsoft Sentinel.
- Log into your Zoho Vault account as a Super Admin.
- Navigate to Settings and select SIEM Integration.
- Under MS Sentinel DCR-Based, click Edit Configurations.
- Enter the required Azure details:
- Azure tenant ID: Located in the Subscriptions section of the Azure portal.
- Logs ingestion endpoint: Found in Data Collection Endpoints.
- Azure client ID (application ID): Located on the Overview page of the app registration you created earlier (e.g., ZohoVaultLogging).
- Azure client secret: Use the client secret value generated under Certificates & Secrets in the app registration.
- Data Collection Rule ID: Found in Data Collection Rules as the immutable ID.
- Stream name: Navigate to Data Collection Rules, open your DCR, and select JSON View.
- Copy the stream name (e.g., Custom-ZohoVaultLogs_CL).
- Is Azure US Government Cloud: Enable this toggle only if you are using Azure US Government Cloud.

Info: Azure US Government provides a dedicated cloud environment designed for U.S. government agencies and their partners. It supports workloads that must comply with specific U.S. government regulations and compliance requirements.
Learn more.