https://store-images.s-microsoft.com/image/apps.15612.9620d549-f573-4e0c-9539-c059f0bd50b5.b137a5cf-57c8-46be-aa67-d963bf94a9df.1b5bf8d7-70c0-4bae-87e6-6b26581a29c8

Commvault Cloud for Sentinel

Commvault

Commvault Cloud for Sentinel

Commvault

It enables Commvault users to ingest alerts and other data into their Sentinel Instance.

Commvault Cloud Data Connector for Microsoft Sentinel

About This Solution

What it offers: Automated security event ingestion from Commvault Cloud environments directly into Microsoft Sentinel, enabling centralized threat detection, incident response, and compliance monitoring for your data protection infrastructure.

Event Types Collected: By default, collects security-relevant events like anomalies and malware/ransomware threats as documented in the Threat Indicators Dashboard. Refer to the detailed documentation for more details.

Problem it solves: Eliminates security blind spots in data protection environments by providing real-time visibility into Commvault security events, reducing manual monitoring overhead, and enabling faster threat detection and response.

Quick Setup

  1. Create Access Token: Generate access/refresh tokens in Commvault Cloud with Admin privileges
  2. Setup Key Vault: Create Azure Key Vault with required secrets (access-token, refresh-token, environment-endpoint-url)
  3. Deploy Connector: Install from Sentinel Content Hub and configure Function App parameters
  4. Configure Permissions: Grant Function App access to Key Vault (Access Policies or RBAC)

For detailed configuration steps, prerequisites, and automation setup, visit: https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Commvault%20Security%20IQ