How-To: Export your RADIUS Logs to Azure Log Analytics and Azure Sentinel
EZRADIUS enables your security team to monitor critical user actions by pushing the information to your SIEM. In this page we will show you how to connect your RADIUS logs to Azure Log Analytics and Azure Sentinel.
Prerequisites
How to Export your RADIUS Logs to Azure Sentinel and Log Analytics
Log Analytics
This guide applies to both Azure Log Analytics and Azure Sentinel since Sentinel is built on top of Log Analytics. If you just have Log Analytics, you can use the Workspace ID and Key to connect EZRADIUS to your existing Log Analytics workspace.
- Go to your EZRADIUS portal.
- Click on Settings.

- Scroll to the bottom and enable the “Send Audit Logs” to SIEM option.

- Select Sentinel as the SIEM Provider.
- In another tab, go to the Azure Portal
- Select the log analytics connected to your Sentinel instance.
- Click on “Agents Management”.

- Copy Your Workspace ID.

- Go back to the EZRADIUS tab and paste it in the “Workspace ID” field.

- Go back to the Azure tab and copy the primary key.

- Go back to the EZRADIUS tab and paste the key in the “Workspace Key” field.

- Click the “Test Connection” button, this will create a test log in your SIEM to make sure EZRADIUS can write to the SIEM.
- If the connection test is successful, click “Save changes” at the top of the subscription.

- EZRADIUS will now send your security logs to your SIEM. If an error occurs it will email your subscription PKI administrators. EZRADIUS will now send your security logs to your SIEM. If an error occurs it will email your subscription PKI administrators. Now you should check out how to create a dashboard for your RADIUS service
How To Create Alerts in Azure Sentinel to Monitor Your Cloud RADIUS Activity
Using a SIEM enables you to create alerts for critical operations or abnormal behavior. We recommend setting up alerts for any high criticality event, and closely monitor medium and low events. Below are sample queries for the Administrator events.
Azure Sentinel
EZRadiusAdministrator_CL | where Action_s == "NotAuthorized"
CrowdStrike Falcon LogScale
LogType = "EZRadiusAdministrator" and Action = "NotAuthorized"