Microsoft Sentinel
Integration with Microsoft Sentinel
Connecting Microsoft Sentinel
Connecting Microsoft Sentinel to Validia has never been easier! To start, visit the integrations page at https://app.validia.ai/integrations, where you'll see Microsoft Sentinel listed:

After clicking on Microsoft Sentinel, you'll be shown a pop-up to provide your Workspace ID and Primary Key for your Log Analytics Group in Azure.

Once you submit, Microsoft Sentinel should show up as connected on your integrations page! You are now ready to start joining meetings, and getting logs in your Log Group.

Viewing Logs
The Microsoft Sentinel Integration creates two new tables in your Microsoft Log Analytics Group:
ValidiaAuthentications_CL
ValidiaDeepfakeDetection_CL
ValidiaAuthentications
This table will contain all successful identity validations from any of your meetings. These logs contain the following data:
botId_g
String
Unique Meeting ID
time_s
Integer
Epoch Time of Validation
name_s
String
Name of Meeting Participant
confidence_s
Float
Authentication Confidence
success_s
Boolean
Successful Authentication?
modality_s
String
Video or Audio
verifiedAs_s
String
Associated Biometric
The logs will appear in realtime throughout the course of a Validia meeting, and will look like the following in Sentinel Logs:

ValidiaDeepfakeDetection
This table will contain all deepfake detection scores for participants in the call. These logs contain the following data:
botId_g
String
Unique Meeting ID
time_s
Integer
Epoch Time of Validation
name_s
String
Name of Meeting Participant
confidence_s
Float
Authentication Confidence
deepfake_s
Boolean
True if Deepfake
modality_s
String
Video or Audio
verifiedAs_s
String
Associated Biometric
The logs will appear in realtime throughout the course of a Validia meeting, and will look like the following in Sentinel Logs:

Last updated
Was this helpful?