Obsidian Security Announces Integration with Microsoft Sentinel to Bolster Enterprise SaaS Security

PUBlished on
December 11, 2025
|
updated on
December 11, 2025

Stephanie Lee

SaaS applications are prime targets for bad actors because they store critical business data. Yet even as SaaS breaches have surged by 300%, only a small share of third-party apps are properly secured. Up to 78% of SaaS usage is outside IT’s visibility despite their deep integrations with critical systems. The result is major blind spots that notorious hackers exploit to move laterally and steal sensitive information across the SaaS supply chain in minutes.

Preventing these attacks requires real-time, contextual visibility across your SaaS estate. While connecting applications directly to a SIEM may seem adequate, each vendor defines data differently, making cross-app tracking difficult and generating inconsistent logs, false positives, and missed signals. This makes the need for normalized SaaS telemetry clearer than ever.

Obsidian Security is now integrated with Microsoft Sentinel to remove this complexity by providing a simplified and intelligent view of your entire SaaS environment directly within the Microsoft Sentinel console. With normalized, cross-correlated SaaS activity data and breach-informed threat alerts delivered out-of-the-box, security teams can strengthen their detection and response capabilities and act on SaaS incidents before it is too late.

“AI agents are accelerating how data is accessed and moved across SaaS, which raises the bar for SOC response. Obsidian Security’s integration with Microsoft Sentinel helps shorten the path from threat detection to remediation for SOC teams. Obsidian Security helps teams investigate faster and protect their SaaS data against sophisticated threats like cybercriminals and risky AI agents by delivering clear context and alerts into Microsoft Sentinel." - Jesse Kopavi, Principal Product Manager, Microsoft Security

Bring High-Impact SaaS Insights Directly into Microsoft Sentinel

Microsoft Sentinel already provides a strong foundation for detection and response for your organization. The challenge is that many of the most important signals now live inside SaaS, spread across apps, identities, and integrations. That's where Obsidian can help.

By streaming Obsidian's SaaS threat alerts and cross-SaaS activity data into Microsoft Sentinel, you can spot real threats faster and move from detection to investigation with far more context.

Connect Obsidian to Microsoft Sentinel via a simple API and tap into 140+ out-of-the-box connectors to gain deeper visibility and high-fidelity SaaS telemetry across your environment. The result? Stronger detections, faster investigations, and a clearer view of SaaS activity inside the tool your SOC already uses.

How You Can Leverage Obsidian Security Alerts in Microsoft Sentinel

Let’s explore three use cases for SOC teams when integrating Obsidian with their Microsoft Sentinel SIEM:

Use Case 1: Accelerate Incident Response with High-Fidelity Threat Alerts

Obsidian Security has built powerful SaaS threat detections based on real-world incident responses. These firsthand insights directly inform our models and deliver relevant alerts and event details directly to the SIEM. Alerts are tagged by criticality to ensure clear prioritization and focus.

Mapped to the MITRE ATT&CK framework and enriched with unique TTPs informed by Obsidian, security teams can easily review, investigate, and act with confidence when alerts are fired. This threat intelligence further contextualizes Microsoft Sentinel data across network, endpoint, and cloud systems, providing a comprehensive, correlated picture that reduces noise and ensures teams act on validated, high-impact signals.

Example Scenario:

  1. An alert for uncommon network infrastructure and related events are sent to Microsoft Sentinel for SOC analysts to investigate the incident in depth.
  2. Obsidian resolves disparate accounts back to a single common identity and normalizes activity across all SaaS apps to clearly identify the user involved and accelerate IR investigation and triage with context.
  3. Remediation steps offer clear guidance to resolve alerts without requiring every SOC member to be an expert for all SaaS applications.

Use Case 2: Strengthen Threat Hunting Investigations Powered by High Value Security Data

Normalized SaaS activity data streamed directly into Microsoft Sentinel consolidates visibility and provides teams with a unified view of what’s happening across their SaaS environment.

SOC analysts can now leverage these insights to augment proactive investigations, moving beyond reactive alert handling. With Obsidian’s human-readable SaaS telemetry, analysts can easily uncover suspicious activity, behavioral anomalies, and early indicators of compromise.

Example Scenario:

  1. A vendor discloses a breach, stating that usernames and passwords for its product have been exposed. You don’t believe the application is used within your organization, but wish to confirm.
  2. Query Obsidian data to identify whether an internal user has logged directly into a shadow SaaS account for this vendor. There is one discovered user.
  3. Confirm with the user that they use this application, assist them in resetting credentials, and bring the app under your SSO policy for proper control.

Use Case 3: Build Custom Threat Detections within Microsoft Sentinel with SaaS Activity Data

Security teams can leverage Obsidian’s rich SaaS telemetry and insights to build custom threat models or fine-tune existing alerts, deepening detection and response capabilities. Normalized identity and activity logs across SaaS build behavioral baselines, making it easier to spot deviations that indicate compromise.

By enriching Microsoft Sentinel with high-quality SaaS context, teams can reduce alert noise, fine-tune detection sensitivity, and ensure SOC analysts focus on the threats that truly matter.

Example Scenario:

  1. A SOC member wishes to create a custom impossible travel alert. Ingest rich SaaS activity data from Obsidian into Microsoft Sentinel to gain detailed visibility across all connected SaaS applications.
  2. Use identity-centric SaaS data as an added signal to better baseline patterns and behaviors across your environment that would be hard to determine with disparate logs or endpoint/network-level data alone. In this example, Obsidian correlates account privilege and location data to users to help build custom impossible travel alerts in Microsoft Sentinel.
  3. Build custom rules using activity data to support security needs unique to your organization. Now, a sudden foreign login paired with a new high-risk OAuth grant triggers an alert, something endpoint and network tools would never detect.

How to Get Started

The Obsidian Security integration with Microsoft Sentinel removes SaaS security complexity for teams by providing a simplified and intelligent view of your entire SaaS environment directly within the Microsoft Sentinel console. With normalized, cross-correlated SaaS activity data and breach-informed threat alerts delivered out of the box, security teams can strengthen their detection and response capabilities and act on SaaS incidents before it is too late.

Visit our website for more information about Obsidian Security’s comprehensive SaaS threat detection and response solutions. To see our detections in action, click here to set up a demo.

Frequently Asked Questions (FAQs)

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo