Knowledge Base Article

Deploying the Cato Sentinel Connector | Full Installation & Setup Guide for Azure Sentinel

In this video, we’ll walk you through the complete setup of the Cato Sentinel Connector, connecting your Cato Networks environment to Microsoft Azure Sentinel for unified visibility and smarter threat detection. 

What You’ll Learn:

  • Setting up your Azure environment (Resource Group, Log Analytics Workspace, Sentinel)
  • Creating your Cato API Key and finding your Account ID
  • Deploying the ARM template / Azure Function App to ingest Cato Events, CEF, Audit Logs & XDR Stories
  • Configuring data ingestion and filters for efficient log collection
  • Installing the Sentinel Workbook to visualize Cato data
  • Best practices and tuning tips for ingestion and workspace setup

Who It’s For: Security engineers, SOC analysts, and IT professionals using Cato Networks who want to enhance visibility through Azure Sentinel. 

Prerequisites:

  • Active Cato Networks account with API access
  • Azure subscription with Sentinel enabled
  • Permissions to deploy ARM templates and Function Apps

By the end of this tutorial, you’ll have a fully operational integration between Cato Networks and Azure Sentinel, empowering your team with advanced insights and real-time threat correlation.

Github repository: https://github.com/catonetworks/cato-sentinel-connect 

 

 

Published 5 days ago
Version 1.0
No CommentsBe the first to comment