Introduction to Microsoft Azure log integration

Azure log integration enables you to integrate raw logs from your Azure resources with your on-premises Security Information and Event Management (SIEM) systems in the event that a connector to Azure Monitor is not yet available from your SIEM vendor.

The preferred method for integrating Azure logs is by using your SIEM vendor’s Azure Monitor connector and following these instructions. However, if your SIEM vendor doesn’t provide a connector to Azure Monitor, you may be able to use Azure Log Integration as a temporary solution (if your SIEM is supported by Azure Log Integration) until such a connector is available.


If your primary interest is in collecting virtual machine logs, most SIEM vendors include this in their solution. Using the SIEM vendor's connector should always be the preferred alternative.

Azure log integration collects Windows events from Windows Event Viewer logs, Azure Activity Logs, Azure Security Center alerts, and Azure Diagnostic logs from Azure resources. This integration helps your SIEM solution provide a unified dashboard for all your assets, on-premises or in the cloud, so that you can aggregate, correlate, analyze, and alert for security events.


At this time, the only supported clouds are Azure commercial and Azure Government. Other clouds are not supported.

Azure log integration

What logs can I integrate?

Azure produces extensive logging for every Azure service. These logs represent three types of logs:

  • Control/management logs provide visibility into the Azure Resource Manager CREATE, UPDATE, and DELETE operations. Azure Activity Logs is an example of this type of log.
  • Data plane logs provide visibility into the events raised as part of the usage of an Azure resource. An example of this type of log is the Windows Event Viewer's System, Security, and Application channels in a Windows virtual machine. Another example is Diagnostics Logging configured through Azure Monitor
  • Processed events provide analyzed event and alert information processed on your behalf. An example of this type of event is Azure Security Center Alerts, where Azure Security Center has processed and analyzed your subscription to provide alerts relevant to your current security posture.

Azure Log Integration supports ArcSight, QRadar, and Splunk. In all circumstances, check with your SIEM vendor to assess whether they have a native connector. You should not use Azure Log Integration when native connectors are available.

If there are no other options available, Azure Log Integration may be considered. The following table includes our recommendations.

SIEM Customer already using log integrator Customer investigating SIEM integration options
SPLUNK Begin migrating to the Azure monitor add-on for Splunk Use SPLUNK connector
IBM QRADAR Migrate to or begin using the QRadar connector documented at the end of Use the QRadar connector documented at the end of
ARCSIGHT Continue to use the Log Integrator until a connector is available, then migrate to the connector-based solution. Consider Azure Log Analytics as an alternative. Do not onboard to Azure Log Integration unless you are willing to go through the migration process when the connector becomes available.


While Azure Log Integration is a free solution, there are Azure storage costs resulting from the log file information storage.

If you need assistance you can open a support request. To do this, select Log Integration as the service for which you are requesting support.

Next steps

In this document, you were introduced to Azure log integration. To learn more about Azure log integration and the types of logs supported, see the following: