Enzoic provides real-time alerts when user credentials are exposed in data breaches, and integrating these alerts into your security operations center (SOC) can greatly enhance your threat response. Microsoft Sentinel is a cloud-native SIEM (Security Information and Event Management) platform in Azure that aggregates and analyzes security data across an organization. (Note: You will need an active Microsoft Sentinel instance, not just a generic Azure subscription, to complete this integration.) By using Azure Logic Apps as the bridge, you can automatically ingest Enzoic’s webhook alerts into Sentinel as new security incidents. This means your Enzoic breach alerts will appear alongside other incidents (from tools like Microsoft Defender for Endpoint and the rest of the Microsoft 365 Defender ecosystem) in one unified console for easy correlation and response. This Sentinel integration works with any Enzoic monitoring service that delivers alerts via webhooks, including Password Breach Monitoring (Breach Monitoring API), Identity Breach Monitoring, and Payment Card BIN Monitoring.In this step-by-step guide, we’ll walk through setting up the integration, from configuring Sentinel to creating a Logic App that turns Enzoic webhooks into Sentinel incidents.
Microsoft Sentinel requires a Log Analytics workspace as its foundation. If you haven’t already, start by creating a Log Analytics workspace and enabling Microsoft Sentinel on it:
At this point, you have a Microsoft Sentinel environment ready to ingest data. All incidents and logs from our integration will be stored in and managed by this Sentinel (via the Log Analytics workspace).
The next step is to set up an Azure Logic App that will receive Enzoic webhook alerts and initiate the incident creation in Sentinel. Logic Apps allow you to automate workflows with a series of actions and triggers:

Note: In your Enzoic dashboard or via the Enzoic API, register this Logic App URL as a webhook for breach notifications. This ensures that every new compromised credential alert from Enzoic is sent to your Logic App in real time.
Enzoic’s webhook will send a JSON payload containing details of the exposed account and breach. In our Logic App, we need to parse this JSON so we can easily use the data in subsequent steps (like creating the incident). Azure Logic Apps provides a Parse JSON action for this purpose:
1. Add Parse JSON Action: In the Logic App Designer, click + New Step below the HTTP trigger. Search for Parse JSON and select it. This action will take the raw JSON from the webhook and break it into fields we can reference.
Configure the Parse JSON Action: For the Content field, insert the trigger body from the previous step. You can do this by using an expression or dynamic content. In this case, use the expression:
@triggerBody()
2. This passes the entire JSON body from the webhook to the Parse JSON action.
3. Provide a JSON Schema: Next, click on Use sample payload to generate schema. Paste a sample Enzoic webhook JSON to let Logic Apps derive the schema automatically. For example, a typical Enzoic alert payload might look like:
{
“passwordType”: 1,
“passwordHash”: “482c811da5d5b4bc6d497ffa98491e38”,
“plaintextPassword”: “password123”,
“type”: “accountAlert”,
“username”: “[email protected]”,
“usernameHash”: “f660ab912ec1…e99b8e44a”,
“date”: “2025-11-11T21:45:24.321Z”,
“exposureID”: “57dc11964d6db21300991b78”,
“customData”: null,
“exposureDetails”: {
“title”: “Example Breach”,
“date”: “2024-02-01T00:00:00Z”,
“entries”: 1024,
“domainsAffected”: 10,
“category”: “Test”,
“sourceURLs”: [],
“source”: “Testing – Ignore”,
“passwordTypes”: [1],
“exposedData”: [“Emails”,”Passwords”],
“dateAdded”: “2024-02-01T00:00:00Z”
}
}

With the Parse JSON step in place, our workflow can now interpret Enzoic’s data. The next step is to use that data to create a security incident in Microsoft Sentinel.
Now for the core of the integration: using the parsed webhook data to create a new incident in Microsoft Sentinel. Azure Logic Apps has a built-in connector for Microsoft Sentinel that provides an action to create incidents. We will map the fields from the Enzoic alert to the incident properties:
After saving, our automated workflow is complete. Every time Enzoic sends a webhook alert to this Logic App, the Logic App will parse the JSON and create a new incident in Microsoft Sentinel with the relevant details.
With the Logic App and Sentinel connector set up, it’s important to test the integration to ensure everything works as expected:
If the incident appears, open it to review the details. The description should contain the password type and breach name, and any additional fields (like exposure ID or date) should be attached as well. This confirms that the data mapping worked correctly end-to-end.



By integrating Enzoic alerts into Microsoft Sentinel, you’ve added an important layer of credential compromise monitoring to your SOC’s unified incident view. Every time Enzoic detects that one of your users’ credentials has appeared in a breach, an incident will automatically pop up in Sentinel, allowing your security team to respond quickly just as they would to any other high-priority alert. This automation closes the gap between continually updated threat intelligence (Enzoic) and your cloud-native SIEM (Sentinel), ensuring nothing falls through the cracks.
Key benefits of this integration include:
With Microsoft Sentinel being part of the broader Microsoft 365 Defender ecosystem, this integration also complements your existing defenses. Just as Sentinel can aggregate signals from Microsoft’s own security tools (like Defender for Endpoint alerts for malware or suspicious activities), it can now also ingest Enzoic’s compromised credential alerts. This holistic approach improves your organization’s ability to detect and respond to threats across different domains.
A few simple steps in Azure can significantly strengthen your security posture by automatically raising the alarm when employee credentials are found in breaches. It’s a proactive measure that, combined with strong password policies and endpoint protections, helps keep attackers out of your accounts. By taking advantage of Enzoic’s intelligence within Sentinel, your cloud engineers and security teams can stay one step ahead of credential-based threats through a seamless, automated workflow.
AUTHOR
Josh Parsons
Josh is the Product Manager at Enzoic, where he leads the development and execution of strategies to bring innovative threat intelligence solutions to market. Outside of work, he can be found at the nearest bookstore or exploring the city’s local coffee scene.
*** This is a Security Bloggers Network syndicated blog from Blog | Enzoic authored by Enzoic. Read the original post at: https://www.enzoic.com/blog/microsoft-sentinel-with-azure-logic-apps/