Support & Downloads

Quisque actraqum nunc no dolor sit ametaugue dolor. Lorem ipsum dolor sit amet, consyect etur adipiscing elit.

s f

Contact Info
198 West 21th Street, Suite 721
New York, NY 10010
+88 (0) 101 0000 000

Cloud teams tell us they want to be able to see security issues in their environment in a central location. Going from one proprietary dashboard to another with several context switches, different query languages and only limited views of the whole picture is not just a very arduous task, it also means that things get missed.

All the visibility, but nothing to see.

ARGOS is laser-focused on cloud configuration, and that makes us amazing at that, but there are other areas that we do not cover, like workloads (Windows/Linux VMs) or network traffic.

All this together can give amazing insights into what is happening in an environment overall.

That is why ARGOS, by customer demand, is starting to integrate with several SIEM providers. Microsoft Sentinel (formerly Azure Sentinel) is the first one.

Configuring the Sentinel Integration

In order to integrate ARGOS to Microsoft Sentinel there are a few prerequisites that need to be available.

  1. Azure Log Analytics Workspace
  2. Microsoft Sentinel enabled on the Log Analytics Workspace
Follow the Microsoft documentation to deploy these.
Once these prerequisites have been deployed it is only three simple steps from here to have ARGOS send detections also to Sentinel.
  1. Browse to
  2. Open a new browser tab and find your Log Analytics Workspace on . Under “Agents management” take note of your Workspace ID and Primary Key.
  3. Paste both the Workspace ID and Primary Key into the ARGOS dashboard.
New ARGOS detections will now automatically be sent to your Log Analytics Workspace and can be easily queried from Azure and correlated to other events in your workspace.

Helpful Microsoft Sentinel Queries

Once this integration is enabled any new ARGOS detections will be available. Here are some interesting and helpful queries to get you started.

Either via Log Analytics, Azure Monitor or Microsoft Sentinel, access your Logs tab.


This following query will show you all the events, unfiltered.


This query will show all exploitable detections on Azure, that are currently still open and sorts them by the time they were generated.

ARGOS_CL | where exploitable_b and cloud_s == 'azure' and status_s == 'open' | sort by TimeGenerated

This query will render a time chart with all open ARGOS Detections on Azure.

ARGOS_CL | where cloud_s == 'azure' and status_s == 'open' | summarize count() by TimeGenerated | render timechart

Now, this one here will not just show you the ARGOS detections, but will show you all Azure VMs that have failed logon attempts via RDP and map those to any ARGOS detection for that VM.

SecurityEvent | where EventID == 4625 | extend ComputerName = Computer
| join ( ARGOS_CL | where status_s == 'open' | extend ComputerName = name_s) on ComputerName
| project ComputerName, TimeGenerated, EventID, Account, SourceIpAddress = IpAddress, SourceComputerName = WorkstationName, AzureResourceId = ResourceId, ARGOS_Url = url_s, ARGOS_RuleId = ruleId_s, SubscriptionId = tostring(connectionId_g), ResourceGroup

You can from here even create an alert rule for any of these queries.

Free Trial

Test ARGOS and the Microsoft Sentinel integration for 30 days, for free, by signing up at and see how much time you can save on manually investigating your cloud security issues.