Whether you are just starting your observability journey or already are an expert, our courses will help advance your knowledge and practical skills.
Expert insight, best practices and information on everything related to Observability issues, trends and solutions.
Explore our guides on a broad range of observability related topics.
Microsoft Sentinel (formerly known as Azure Sentinel) is a Security Information and Event Management (SIEM) solution that offers cloud-native capabilities to provide a birds-eye view of the security posture of an organization. Built on the Azure platform, it uses AI and machine learning to detect, identify, and respond to threats in real time.
Sentinel focuses on reducing the noise of benign incidents and zeroing in on real threats that require immediate attention. It also offers integration options with various Microsoft and third-party services. Being cloud-native, it eliminates the complexities involved with setting up on-premises SIEM systems.
By leveraging the elasticity and processing capabilities of Azure, Sentinel can handle high volumes of data, making it scalable according to organizational needs.
Sentinel offers the following features:
With over a decade of experience in the cybersecurity space, Zack is focused on delivering robust yet affordable security management for organizations with rapidly scaling data volumes.
In my experience, here are tips that can help you better leverage Microsoft Sentinel:
Microsoft Sentinel’s pricing is based on the volume of data ingested for security analysis and the type of logs processed. The pricing structure includes Pay-As-You-Go and Commitment Tiers for analytics logs, as well as separate pricing for basic logs.
Microsoft Sentinel offers a free trial for the first 31 days, allowing new workspaces to ingest up to 10GB/day of log data without additional charges. The free trial is limited to 20 workspaces per Azure tenant, with additional usage billed at standard rates.
Analytics logs support all data types, enabling security analytics, alerts, and unlimited queries. Pricing options for analytics logs in the US Central region include:
Pay-as-you-go:
Commitment tiers:
Tier | Daily Cost | Effective Per GB Price | Savings |
100 GB per day | 342.52 | 3.43 | 34% |
200 GB per day | 633.56 | 3.17 | 39% |
500 GB per day | 1,460.80 | 2.93 | 44% |
10,000 GB per day | 25,576 | 2.56 | 51% |
50,000 GB per day | 117,990 | 2.36 | 55% |
Basic logs are intended for high-volume, low-security-value data and are used primarily for ad-hoc queries and investigations.
Feature | Price |
Basic logs analysis | $1.12 per GB |
Basic logs search queries | $0.007 per GB scanned |
Log data retention:
Log data archive:
Search jobs:
Log data restore:
SAP applications monitoring:
While Microsoft Sentinel offers capabilities, it has several limitations that organizations should consider. These limitations were shared by users on the G2 platform:
Here are some of the ways that organizations can make the best use of Microsoft Sentinel.
Microsoft Sentinel can integrate with a range of data sources to enhance its detection and response capabilities. With built-in data connectors, Sentinel can ingest logs and alerts from various Microsoft services, such as Microsoft Defender for Endpoint, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity.
These integrations allow Sentinel to create security detections and provide a holistic view of the organization’s security posture. Additionally, Sentinel supports integration with third-party services and multi-cloud environments, which broadens the scope of monitoring and threat detection.
The investigation graph in Microsoft Sentinel is a tool for exploring and visualizing the full scope of security incidents. When an alert is triggered, the graph displays related entities, such as user accounts, IP addresses, and devices involved in the incident.
This interactive tool allows analysts to construct a detailed timeline of events, identify the root cause, and understand the progression of an attack. By providing a clear view of the threat landscape, the investigation graph helps in making informed decisions on remediation and mitigation actions.
Microsoft Sentinel includes a set of predefined threat hunting queries that can be used to proactively search for indicators of compromise (IOCs) within an organization’s environment. These queries help identify unusual patterns and behaviors that might indicate a security breach.
Analysts can customize and run these queries to detect emerging threats and investigate suspicious activities. By regularly using threat hunting queries, organizations can stay ahead of potential threats.
User and entity behavior analytics (UEBA) in Microsoft Sentinel provides insights into the activities of users and entities within the network. UEBA helps detect anomalous behavior that might signify insider threats or compromised accounts.
By analyzing the behavior of users, devices, and other entities, Sentinel can identify deviations from normal patterns and flag them for further investigation. These insights are useful for understanding the context of security incidents and taking appropriate action to mitigate risks.
Watchlists in Microsoft Sentinel are used to enhance detection and investigation processes. Watchlists can include data such as IP addresses, domains, and user accounts that are of particular interest or concern. For example, organizations can create watchlists of known malicious IP addresses or recently terminated employees.
These watchlists can be integrated into automated playbooks to enrich alerts and simplify incident response. By maintaining watchlists, security teams can quickly identify and prioritize threats, improving the efficiency of their security operations.
Coralogix sets itself apart in observability with its modern architecture, enabling real-time insights into logs, metrics, and traces with built-in cost optimization. Coralogix’s straightforward pricing covers all its platform offerings including APM, RUM, SIEM, infrastructure monitoring and much more. With unparalleled support that features less than 1 minute response times and 1 hour resolution times, Coralogix is a leading choice for thousands of organizations across the globe.