Blog Post

Microsoft Security Community Blog
13 MIN READ

The Unified SecOps Transition — Why It Is a Security Architecture Decision, Not Just a Portal Change

Mohit_Kumar1's avatar
Mohit_Kumar1
Icon for Microsoft rankMicrosoft
Apr 23, 2026

Microsoft will retire the standalone Azure Sentinel portal on March 31, 2027. Most of the conversation around this transition focuses on cost optimization and portal consolidation. That framing undersells what is actually happening.

The unified Defender portal is not a new interface for the same capabilities. It is the platform foundation for a fundamentally different SOC operating model — one built on a 2-tier data architecture, graph-based investigation, and AI agents that can hunt, enrich, and respond at machine speed. Partners who understand this will help customers build security programs that match how attackers actually operate. Partners who treat it as a portal migration will be offering the same services they offered five years ago.

This document covers four things:

  1. What the unified platform delivers — the security capabilities that do not exist in standalone Sentinel and why they matter against today’s threats.
  2. What the transition really involves - is not data migration, but it is a data architecture project that changes how telemetry flows, where it lives, and who queries it.
  3. Where the partner opportunity lives — a structured progression from professional services (transactional, transition execution, and advisory) to ongoing managed security services.
  4. Why does the unified platform win competitively — factual capability advantages that give partners a defensible position against third-party SIEM alternatives.

The Bigger Picture: Preparing for the Agentic SOC

Before getting into transition mechanics, partners need to understand where the industry is headed — because the platform decisions made during this transition will determine whether a customer’s SOC is ready for what comes next.

The security industry is moving from human-driven, alert-centric workflows to an operating model built on three pillars:

  • Intellectual Property — the detection logic, hunting hypotheses, response playbooks, and domain expertise that differentiate one security team from another.
  • Human Orchestration — the judgment, context, and decision-making that humans bring to complex incidents. Humans set strategy, validate findings, and make containment decisions. They do not manually triage every alert.
  • AI Agents - built agents that execute repeatable work: enriching incidents, hunting across months of telemetry, validating security posture, drafting response actions, and flagging anomalies for human review.

The SOC of 2027 will not be scaled by hiring more analysts. It will be scaled by deploying agents that encode institutional knowledge into automated workflows — orchestrated by humans who focus on the decisions that require judgment.

This transformation requires a platform that provides three things:

  1. Deep telemetry — agents need months of queryable data to analyze behavioral patterns, build baselines, and detect slow-moving threats. The Sentinel Data Lake provides this at a cost point that makes long-retention feasible.
  2. Relationship context — agents need to understand how entities connect. Which accounts share credentials? What is the blast radius of a compromised service principle? What is the attack path from a phished user to domain admin? Sentinel Graph provides this.
  3. Extensibility — partners and customers need to build and deploy their own agents without waiting for Microsoft to ship them. The MCP framework and Copilot agent architecture provide this.

None of these exist in standalone Azure Sentinel. All three ship with the unified platform.

The urgency goes beyond the March 2027 deadline. Organizations are deploying AI agents, copilots, and autonomous workflows across their businesses — and every one of those creates a new attack surface. Prompt injection, data poisoning, agent hijacking, cross-plugin exploitation — these are not theoretical risks. They are in the wild today. Defending against AI-powered attacks requires a security platform that is itself AI Agent-ready. The unified Defender portal is that platform.

What the Unified Platform Actually Delivers

The original framing — “single pane of glass for SIEM and XDR” — is accurate but insufficient. Here is what the unified platform delivers that standalone Sentinel does not.

Cross-Domain Incident Correlation

The Defender correlation engine does not just group alerts by time proximity. It builds multi-stage incident graphs that link identity compromise to lateral movement to data exfiltration across SIEM and XDR telemetry — automatically.

Consider a token theft chain: an infostealer harvests browser session cookies (endpoint telemetry), the attacker replays the token from a foreign IP (Entra ID sign-in logs), creates a mailbox forwarding rule (Exchange audit logs), and begins exfiltrating data (DLP alerts). In standalone Sentinel, these are four separate alerts in four different tables. In the unified platform, they are one correlated incident with a visual attack timeline.

2-Tier Data Architecture

The Sentinel Data Lake introduces a second storage tier that changes the economics and capabilities of security telemetry:

 

Analytics Tier

Data Lake

Purpose

Real-time detection rules, SOAR, alerting

Hunting, forensics, behavioral analysis, AI agent queries

Latency

Sub-5-minute query and alerting

Minutes to hours acceptable

Cost

~$4.30/GB PAYG ingestion (~$2.96 at 100 GB/day commitment)

~$0.05/GB ingestion + $0.10/GB data processing (at least 20x cheaper)

Retention

90 days default (expensive to extend)

Up to 12 years at low cost

Best for

High-signal, low-volume sources

High-volume, investigation-critical sources

The architecture decision is not “which tier is cheaper.” It is “which tier gives me the right detection capability for each data source.”

  • Analytics tier candidates: Entra ID sign-in logs, Azure activity, audit logs, EDR alerts, PAM events, Defender for Identity alerts, email threat detections. These need sub-5-minute alerting.
  • Data Lake candidates: Raw firewall session logs, full DNS query streams, proxy request logs, Sysmon process events, NSG flow logs. These drive hunting and forensic analysis over weeks or months.
  • Dual-ingest sources: Some sources need both tiers. Entra ID sign-in logs are the canonical example — analytics tier for real-time password spray detection, Data Lake for graph-based blast radius analysis across months of authentication history. Implementation is straightforward: a single Data Collection Rule (DCR) transformation handles the split. One collection point, two routing destinations.

The right framing: “Right data in the right tier = better detections AND lower cost.” Cost savings are a side effect of good security architecture, not the goal.

Sentinel Graph

Sentinel Graph enables SOC teams and AI agents to answer questions that flat log queries cannot:

  • What is the blast radius of this compromised account?
  • Which service principals share credentials with the breached identity?
  • What is the attack path from this phished user to domain admin?
  • Which entities are connected to this suspicious IP across all telemetry sources?

Graph-based investigation turns isolated alerts into context-rich intelligence. It is the difference between knowing “this account was compromised” and understanding “this account has access to 47 service principals, 3 of which have written access to production Key Vault.”

Security Copilot Integration

Security Copilot embedded in the unified portal helps analysts summarize incidents, generate hunting queries, explain attacker behavior, and draft response actions. For complex multi-stage incidents, it reduces the time from “I see an alert” to “I understand the full scope” from hours to minutes. With free SCUs available with Microsoft 365 E5, teams can apply AI to the highest-effort investigation work without adding incremental cost.

MCP and the Agent Framework

The Model Context Protocol (MCP) and Copilot agent architecture let partners and customers build purpose-built security agents. A concrete example: an MCP-enabled agent can automatically enrich a phishing incident by querying email metadata, checking the sender against threat intelligence, pulling the user’s recent sign-in patterns, correlating with Sentinel Graph for lateral risk, and drafting a containment recommendation — in under 60 seconds.

This is where partner intellectual property becomes competitive advantage. The agent framework is the mechanism for encoding proprietary detection logic, response playbooks, and domain expertise into automated workflows that run at machine speed.

Security Store

Security Store allows partners to evolve from one‑time transition projects into repeatable, scalable offerings—supporting professional services, managed services, and agent‑based IP that align with the customer’s unified SecOps operating model. As part of the transition, the Microsoft Security Store becomes the extension layer for the unified SecOps platform—allowing partners to deliver differentiated agents, SaaS, and security services natively within Defender and Sentinel, instead of building and integrating in isolation

The 4 Investigation Surfaces: A Customer Maturity Ladder

The Sentinel Data Lake exposes four distinct investigation surfaces, each representing a step toward the Agentic SOC — and a partner service opportunity:

Surface

Capability

Maturity Level

Partner Opportunity

KQL Query

Ad-hoc hunting, forensic investigation

Basic — “we can query”

Hunting query libraries; KQL training

Graph Analytics

Blast radius, attack paths, entity relationships

Intermediate — “we understand relationships”

Graph investigation training; attack path workshops

Notebooks (PySpark)

Statistical analysis, behavioral baselines, ML models

Advanced — “we predict behaviors”

Custom notebook development; anomaly scoring

Agent/MCP Access

Autonomous hunting, triage, response at machine speed

Agentic SOC — “we automate”

Custom agent development; MCP integration

The customer who starts with “help us hunt better” ends up at “build us agents that hunt autonomously.” That is the progression from professional services to managed services.

What the Transition Actually Involves

It is not a data migration — customers’ underlying log data and analytics remain in their existing Log Analytics workspaces. That is important for partners to communicate clearly.

But partners should not set the expectation that nothing changes except the URL. Microsoft’s official transition guide documents significant operational changes — including automation rules and playbooks, analytics rule, RBAC restructuring to the new unified model (URBAC), API schema changes that break ServiceNow and Jira integrations, analytics rule transitions where the Fusion engine is replaced by the Defender XDR correlation engine, and data policy shifts for regulated industries. Most customers cannot navigate this complexity without professional help.

Important: Transitioning to the Defender portal has no extra cost - estimate the billing with the new Sentinel Cost Estimator

Optimizing the unified platform means making deliberate changes:

  • Adding dual-ingest for critical sources that need both real-time detection and long-horizon hunting.
  • Moving high-volume telemetry to the Data Lake — enabling hunting at scale that was previously cost-prohibitive.
  • Retiring redundant data copies where Defender XDR already provides the investigation capability.
  • Updating RBAC, automation, and integrations for the unified portal’s consolidated schema and permission structure.
  • Training analysts on new investigation workflows, Sentinel Graph navigation, and Copilot-assisted triage.

Threat Coverage: The Detection Gap Most Organizations Do Not Know They Have

This transition is an opportunity to quantify detection maturity — and most organizations will not like what they find.

Based on real-world breach analysis — infostealers, business email compromise, human-operated ransomware, cloud identity abuse, vulnerability exploitation, nation-state espionage, and other prevalent threat categories — organizations running standalone Sentinel with default configurations typically have significant detection gaps. Those gaps cluster in three areas:

  • Cross-domain correlation gaps — attacks that span identity, endpoint, email, and cloud workloads. These require the Defender correlation engine because no single log source tells the complete story.
  • Long-retention hunting gaps — threats like command-and-control beaconing and slow data exfiltration that unfold over weeks or months. Analytics-tier retention at 90 days is too expensive to extend and too short for historical pattern analysis.
  • Graph-based analysis gaps — lateral movement, blast radius assessment, and attack path analysis that require understanding entity relationships rather than flat log queries.

The unified platform with proper log source coverage across Microsoft-native sources can materially close these gaps — but only if the transition includes a detection coverage assessment, not just a portal cutover.

Partners should use MITRE ATT&CK as the common framework for measuring detection maturity. Map existing detections to ATT&CK tactics and techniques before and after transition — a measurable, defensible improvement that justifies advisory fees and ongoing managed services.

Partner Opportunity: Professional Services to Managed Services

The USX transition creates a structured progression for all partner types — from professional services that build trust and surface findings, to managed security services that deliver ongoing value. The key insight most partners miss: do not jump from “transition assessment” to “managed services pitch.” Customers are not ready for that conversation until they have experienced the value of professional services. The bridge engagement — whether transactional, transition execution, or advisory — builds trust, demonstrates the expertise, and surfaces the findings that make the managed services conversation a logical next step.

Professional Services (transactional + transition execution + advisory) → Managed Security Services (MSSP)

The USX transition is the ideal professional services entry point because it combines a mandatory deadline (March 2027) with genuine technical complexity (analytics rule, automation behavioral changes, RBAC restructuring, API schema shifts) that most customers cannot navigate alone. Every engagement produces findings — detection gaps, automation fragility, staffing shortfalls — that are the most credible possible evidence for managed services.

Professional Services

Transactional Partners

Offer

Customer Value

Key Deliverables

Transition Readiness Assessment

Risk-mitigated transition with clear scope

Sentinel deployment inventory; Defender portal compatibility check; transition roadmap with timeline; MITRE ATT&CK detection coverage baseline

Transition Execution and Enablement

Accelerated time-to-value, minimal disruption

Workspace onboarding; RBAC and automation updates; Dual-portal testing and validation; SOC team training on unified workflows

Security Posture and Detection Optimization

Better detections and lower cost

Data ingestion and tiering strategy; Dual-ingest implementation for critical sources; Detection coverage gap analysis; Automation and Copilot/MCP recommendations

Advisory Partners

Offer

Customer Value

Key Deliverables

Executive and Strategy Advisory

Leadership alignment on why this transition matters

Unified SecOps vision and business case; Zero Trust and SOC modernization alignment; Stakeholder alignment across security, IT, and leadership

Architecture and Design Advisory

Future-ready architecture optimized for the Agentic SOC

Target-state 2-tier data architecture; Dual-ingest routing decisions mapped to MITRE tactics; RBAC, retention, and access model design

Detection Coverage and Gap Analysis

Measurable detection maturity improvement

Current-state MITRE ATT&CK coverage mapping; Gap analysis against 24 threat patterns; Detection improvement roadmap with priority recommendations

SOC Operating Model Advisory

Smooth analyst adoption with clear ownership

Redesigned SOC workflows for unified portal; Incident triage and investigation playbooks; RACI for detection engineering, hunting, and platform ops

Agentic SOC Readiness

Preparation for AI-driven security operations

MCP and agent architecture assessment; Custom agent development roadmap; IP + Human Orchestration + Agent operating model design

Cost, Licensing and Value Advisory

Transparent cost impact with strong business case

Current vs. future cost analysis; Data tiering optimization recommendations; TCO and ROI modeling for leadership

The conversion to managed services is evidence-based. Every professional services engagement produces findings — detection gaps, automation fragility, staffing shortfalls. Those findings are the most credible possible case for ongoing managed services.

Managed Security Services

The unified platform changes the managed security conversation. Partners are no longer selling “we watch your alerts 24/7.” They are selling an operating model where proprietary AI agents handle the repeatable work — enrichment, hunting, posture validation, response drafting — and human experts focus on the decisions that require judgment.

This is where the competitive moat forms. The formula: IP + Human Orchestration + AI Agents = differentiated managed security.

The unified platform enables this through:

  • Multi-tenancy — the built-in multitenant portal eliminates the need for third-party management layers.
  • Sentinel Data Lake — agents can query months of customer telemetry for behavioral analysis without cost constraints.
  • Sentinel Graph — agents can traverse entity relationships to assess blast radius and map attack paths.
  • MCP extensibility — partners can build agents that integrate with proprietary tools and customer-specific systems.

Partners who build proprietary agents encoding their detection logic into the MCP framework will differentiate from partners who rely on out-of-box capabilities.

The Securing AI Opportunity

Organizations are deploying AI agents, copilots, and autonomous workflows across their businesses at an accelerating pace. Every AI deployment creates a new attack surface — prompt injection, data poisoning, agent hijacking, cross-plugin exploitation, unauthorized data access through agentic workflows. These are not theoretical risks. They are in the wild today.

Partners who can help customers secure their AI deployments while also using AI to strengthen their SOC will command premium positioning. This requires a security platform that is itself AI Agent-ready — one that can deploy defensive agents at the same pace organizations deploy business AI. The unified Defender portal is that platform. Partners who position USX as “preparing your SOC for AI-driven security operations” will differentiate from partners who position it as “moving to a new portal.”

Cost and Operational Benefits

Better security architecture also costs less. This is not a contradiction — it is the natural result of putting the right data in the right tier.

Benefit

How It Works

Eliminate low-value ingestion

Identify and remove log sources that are never used for detections, investigations, or hunting. Immediately lowers analytics-tier costs without impacting security outcomes.

Right-size analytics rules

Disable unused rules, consolidate overlapping detections, and remove automation that does not reduce SOC effort. Pay only for processing that delivers measurable security value.

Avoid SIEM/XDR duplication

Many threats can be investigated directly in Defender XDR without duplicating telemetry into Sentinel. Stop re-ingesting data that Defender already provides.

Tier data by detection need

Store high-volume, hunt-oriented telemetry in the Data Lake at at least 20x lower cost. Promote only high-signal sources to the analytics tier. Full data fidelity preserved in both tiers.

Reduce operational overhead

Unified SIEM+XDR workflows in a single portal reduce tool switching, accelerate investigations, simplify analyst onboarding, and enable SOC teams to scale without proportional headcount increases.

Improve detection quality

The Defender correlation engine produces higher-fidelity incidents with fewer false positives. SOC teams spend less time triaging noise and more time on real threats.

Competitive Positioning

Partners need defensible talking points when customers evaluate third-party SIEM alternatives. The following advantages are factual, sourced from Microsoft’s transition documentation and platform capabilities — not marketing claims.

  • No extra cost for transitioning — even for non-E5 customers. Third-party SIEM migrations involve licensing, data migration, detection rewrite, and integration rebuild costs.
  • Native cross-domain correlation across Sentinel + Defender products into multi-stage incident graphs. Third-party SIEMs receive Microsoft logs as flat events — they lack the internal signal context, entity resolution, and product-specific intelligence that powers cross-domain correlation.
  • Custom detections across SIEM + XDR — query both Sentinel and Defender XDR tables without ingesting Defender data into Sentinel. Eliminates redundant ingestion cost.
  • Alert tuning extends to Sentinel — previously Defender-only capability, now applicable to Sentinel analytics rules. Net-new noise reduction.
  • Unified entity pages — consolidated user, device, and IP address pages with data from both Sentinel and Defender XDR, plus global search across SIEM and XDR. Third-party SIEMs provide entity views from ingested data only.
  • Built-in multi-tenancy for MSSPs — multitenant portal manages incidents, alerts, and hunting across tenants without third-party management layers. Try out the new GDAP capabilities in Defender portal.

Industry validation: Microsoft’s SIEM+XDR platform has been recognized as a Leader by both Forrester (Security Analytics Platforms, 2025) and Gartner (SIEM Magic Quadrant, 2025).

Summary: What Partners Should Take Away

Topic

Key Message

Framing

USX is a security architecture transformation, not a portal transition. Lead with detection capability, not cost savings.

Platform foundation

Sentinel Data Lake + Sentinel Graph + MCP/Agent Framework = the platform for the Agentic SOC.

4 investigation surfaces

KQL → Graph → Notebooks → Agent/MCP. A maturity ladder from “we can query” to “we automate at machine speed.”

Architecture

2-tier data model (analytics + Data Lake) with dual-ingest for critical sources. Cost savings are a side effect of good architecture.

Transition complexity

Analytics rules and automation rules. API schema changes. RBAC restructuring. Most customers need professional help.

Partner engagement model

Professional Services (transactional + transition execution + advisory) → Managed Services (MSSP).

Competitive positioning

No extra cost. Native correlation. Cross-domain detections. Built-in multi-tenancy. Capabilities third-party SIEMs cannot replicate.

Partner differentiation

IP + Human Orchestration + AI Agents. Partners who build proprietary agents on MCP have competitive advantage.

Timeline

March 31, 2027. Start now — phased transition with one telemetry domain first, then scale.

 

Updated Apr 22, 2026
Version 1.0

2 Comments

  • paciorkowiec20's avatar
    paciorkowiec20
    Copper Contributor

    Nice article, but let’s be candid: the “unified portal” currently feels more like a frontend consolidation than true backend integration.

     

    This is especially visible in Advanced Hunting, which remains unreliable after the Sentinel + Defender XDR integration. The underlying Log Analytics backends are still separate, so the exact same query may run against Advanced Hunting Log Analytics or Sentinel Log Analytics depending on the selected time range. That creates inconsistent behavior and results.

     

    There are also schema mismatches between the two environments. For example, the AdditionalFields column in the DeviceInfo table is a string in XDR, but dynamic in Sentinel. Issues like this create constant friction for daily investigations, threat hunting, and detection engineering.

     

    From a customer perspective, this is directly affecting operational efficiency. Unfortunately, despite multiple support cases and escalations, product team is not interested in providing improvements in those matters. 

     

    It is also worth noting that Sentinel Data Lake is still unavailable in many Azure regions, including major ones such as West Europe.

    • Mohit_Kumar1's avatar
      Mohit_Kumar1
      Icon for Microsoft rankMicrosoft

      You're right that Advanced Hunting currently surfaces behavioral differences depending on time range and which backend resolves the query. The schema inconsistencies (like AdditionalFields being string in XDR vs. dynamic in Sentinel tables) add friction for detection engineers who work across both. These are real gaps, and I understand the frustration — especially when support escalations don't move the needle. Will raise this up.

      On the "frontend vs. backend" point — the article's thesis is specifically about what's coming through the unified platform that doesn't exist in standalone Sentinel at all: the 2-tier Data Lake architecture, Sentinel Graph for relationship-based investigation, and MCP-based AI agents. These are new backend capabilities, not UI consolidation. The correlation engine that links incidents across Defender XDR + Sentinel and others is also a backend integration that standalone Sentinel can't replicate.

      Sentinel Data Lake is available in West EU with some capacity issues but it has been rolled out incrementally.

      The opportunity for partners is in helping customers navigate exactly the kind of complexity you're describing.