windowsMicrosoft Sentinel

Integration with Microsoft Sentinel

Connecting Microsoft Sentinel

Connecting Microsoft Sentinel to Validia has never been easier! To start, visit the integrations page at https://app.validia.ai/integrationsarrow-up-right, where you'll see Microsoft Sentinel listed:

After clicking on Microsoft Sentinel, you'll be shown a pop-up to provide your Workspace ID and Primary Key for your Log Analytics Group in Azure.

Once you submit, Microsoft Sentinel should show up as connected on your integrations page! You are now ready to start joining meetings, and getting logs in your Log Group.

Viewing Logs

The Microsoft Sentinel Integration creates two new tables in your Microsoft Log Analytics Group:

  1. ValidiaAuthentications_CL

  2. ValidiaDeepfakeDetection_CL

ValidiaAuthentications

This table will contain all successful identity validations from any of your meetings. These logs contain the following data:

Name
Type
What is it?

botId_g

String

Unique Meeting ID

time_s

Integer

Epoch Time of Validation

name_s

String

Name of Meeting Participant

confidence_s

Float

Authentication Confidence

success_s

Boolean

Successful Authentication?

modality_s

String

Video or Audio

verifiedAs_s

String

Associated Biometric

The logs will appear in realtime throughout the course of a Validia meeting, and will look like the following in Sentinel Logs:

ValidiaDeepfakeDetection

This table will contain all deepfake detection scores for participants in the call. These logs contain the following data:

Name
Type
What is it?

botId_g

String

Unique Meeting ID

time_s

Integer

Epoch Time of Validation

name_s

String

Name of Meeting Participant

confidence_s

Float

Authentication Confidence

deepfake_s

Boolean

True if Deepfake

modality_s

String

Video or Audio

verifiedAs_s

String

Associated Biometric

The logs will appear in realtime throughout the course of a Validia meeting, and will look like the following in Sentinel Logs:

Last updated

Was this helpful?