Sentinel Introduction
Why Microsoft Sentinel?
Microsoft Sentinel is a cloud-native SIEM/SOAR solution designed to detect, investigate, hunt, and respond to threats across cloud and on-premises environments.
Why use Sentinel?
Cloud-native (no hardware, auto-scaling)
Integrated with Microsoft 365, Azure, AWS, GCP
Built-in AI/ML for detecting advanced threats (Fusion detection)
SOAR capabilities with automation (Logic Apps)
Built-in Threat Intelligence with Defender TI
Key for Defenders: Sentinel allows analysts to move faster, automate repetitive tasks, and scale defenses without managing underlying infrastructure.
SOC Analysts triage and monitor alerts. Incident Responders investigate and respond. Detection Engineers create and tune rules to detect threats early.
Lesson 1.2: How Sentinel Fits into the Cyber Defense Stack
The Modern Cyber Defense Stack includes:
Security Data Sources (Azure AD, Office 365, AWS, firewalls, EDR tools like Defender for Endpoint)
Microsoft Sentinel (collects, normalizes, correlates, analyzes data)
Incident Management (creates incidents, supports investigation, supports escalation)
Automation/Response Layer (triggers playbooks and responses)
Visualization:
For Defenders:
SOC Analyst: Lives inside "Incidents", "Logs", "Investigation Graph"
Incident Responder: Investigates complex threats across users, endpoints, apps
Detection Engineer: Monitors detection efficacy, tunes analytics rules, improves coverage
Lesson 1.3: Core Components of Microsoft Sentinel
Log Analytics Workspace
Central place where logs are stored and queried
Needed to search events, investigate threats
Connectors
Prebuilt integrations to collect data (Azure, AWS, on-premises)
Needed to get telemetry for visibility
Analytics Rules
Logic that triggers alerts when suspicious behavior is detected
Needed to detect attacks
Incidents
Grouped alerts for investigation and response
Needed for triage and incident handling
Automation (Playbooks)
Automated responses triggered by alerts
Needed to speed up or auto-remediate threats
Threat Hunting
Proactive search for threats using KQL queries
Needed to find attacks missed by rules
Workbooks
Dashboards for visualizing trends and KPIs
Needed for SOC reporting and daily monitoring
Threat Intelligence
Ingested feeds for detecting known bad indicators
Needed for detecting known threats faster
Lesson 1.4: Licensing and Pricing Models
Pay-As-You-Go: Based on log ingestion (GB/day) and retention beyond free limits.
Commitment Tier Pricing: Pay a fixed monthly fee based on expected data volume, with a discount.
Microsoft 365 E5/A5/G5 Licenses: Some Sentinel functionality is available through M365 licensing (especially Defender alerts).
Important Cost Factors for Defenders:
Every connected log source costs ingestion ($$$) — critical to optimize.
Data retention beyond 90 days incurs extra cost.
Alerts and Incidents do not have separate costs — but Automation (playbooks) built on Logic Apps may.
SOC Tip:
Always balance visibility with cost. Collect only the logs that provide actionable security signals.
Last updated