Forum Discussion

klianos's avatar
klianos
Iron Contributor
Mar 18, 2026

What’s New in Microsoft Sentinel and XDR: AI Automation, Data Lake Innovation, and Unified SecOps

The most consequential “new” Microsoft Sentinel / Defender XDR narrative for a deeply technical Microsoft Tech Community article is the operational and engineering shift to unified security operations in the Microsoft Defender portal, including an explicit Azure portal retirement/sunset timeline and concrete migration implications (data tiering, correlation engine changes, schema differences, and automation behavior changes). Official sources now align on March 31, 2027 as the sunset date for managing Microsoft Sentinel in the Azure portal, with customers being redirected to the Defender portal after that date.

The “headline” feature announcements to anchor your article around (because they create new engineering patterns, not just UI changes) are:

  • AI playbook generator (preview): Natural-language-driven authoring of Python playbooks in an embedded VS Code environment (Cline), using Integration Profiles for dynamic API calls and an Enhanced Alert Trigger for broader automation triggering across Microsoft Sentinel, Defender, and XDR alert sources.
  • CCF Push (public preview): A push-based connector model built on the Azure Monitor Logs Ingestion API, where deploying via Content Hub can automate provisioning of the typical plumbing (DCR/DCE/app registration/RBAC), enabling near-real-time ingestion plus ingestion-time transformations and (per announcement) direct delivery into certain system tables.
  • Data lake tier ingestion for Advanced Hunting tables (GA): Direct ingestion of specific Microsoft XDR Advanced Hunting tables into the Microsoft Sentinel data lake without requiring analytics-tier ingestion—explicitly positioned for long-retention, cost-effective storage and retrospective investigations at scale.
  • Microsoft 365 Copilot data connector (public preview): Ingests Copilot-related audit/activity events via the Purview Unified Audit Log feed into a dedicated table (CopilotActivity) with explicit admin-role requirements and cost notes.
  • Multi-tenant content distribution expansion: Adds support for distributing analytics rules, automation rules, workbooks, and built-in alert tuning rules across tenants via distribution profiles, with stated limitations (for example, automation rules that trigger a playbook cannot currently be distributed).
  • Alert schema differences for “standalone vs XDR connector”: A must-cite engineering artifact documenting breaking/behavioral differences (CompromisedEntity semantics, field mapping changes, alert filtering differences) when moving to the consolidated Defender XDR connector path.

 

What’s new and when

Feature and release matrix

The table below consolidates officially documented Sentinel and Defender XDR features that are relevant to a “new announcements” technical article. If a source does not explicitly state GA/preview or a specific date, it is marked “unspecified.”

Feature

Concise description

Status (official)

Announcement / release date

Azure portal Sentinel retirement / redirection

Sentinel management experience shifts to Defender portal; sunset date extended; post-sunset redirection expected

Date explicitly stated

Mar 31, 2027 sunset (date stated)

extension published Jan 29, 2026

Sentinel in Defender portal (core GA)

Sentinel is GA in Defender portal, including for customers without Defender XDR/E5; unified SecOps surface

GA

Doc updated Sep 30, 2025; retirement note reiterated 2026

AI playbook generator

Natural language → Python playbook, documentation, and a visual flow diagram; VS Code + Cline experience

Preview

Feb 23, 2026

Integration Profiles (playbook generator)

Centralized configuration objects (base URL, auth method, credentials) used by generated playbooks to call external APIs dynamically

Preview feature component

Feb 23, 2026

Enhanced Alert Trigger (generated playbooks)

Tenant-level trigger designed to target alerts across Sentinel + Defender + XDR sources and apply granular conditions

Preview feature component

Feb 23, 2026

CCF Push

Push-based ingestion model that reduces setup friction (DCR/DCE/app reg/RBAC), built on Logs Ingestion API; supports transformations and high-throughput ingestion

Public preview

Feb 12–13, 2026

Legacy custom data collection API retirement

Retirement of legacy custom data collection API noted as part of connector modernization

Retirement date stated

Sep 2026 (retirement)

Data lake tier ingestion for Microsoft XDR Advanced Hunting tables

Ingest selected Advanced Hunting tables from MDE/MDO/MDA directly into Sentinel data lake; supports long retention and lake-first analytics

GA

Feb 10, 2026

Microsoft 365 Copilot data connector

Ingests Copilot activities/audit logs; data lands in CopilotActivity; requires specific tenant roles to enable; costs apply

Public preview

Feb 3, 2026

Multi-tenant content distribution: expanded content types

Adds support for analytics rules, automation rules, workbooks, and built-in alert tuning rules; includes limitations and prerequisites

Stated as “supported”; feature described as part of public preview experience in monthly update

Jan 29, 2026

GKE dedicated connector

Dedicated connector built on CCF; ingests GKE cluster activity/workload/security events into GKEAudit; supports DCR transformations and lake-only ingestion

GA

Mar 4, 2026

UEBA behaviors layer

“Who did what to whom” behavior abstraction from raw logs; newer sources state GA; other page sections still label Preview

GA and Preview labels appear in official sources (inconsistent)

Feb 2026 (GA statement)

UEBA widget in Defender portal home

Home-page widget to surface anomalous user behavior and accelerate workflows

Preview

Jan 2026

Alert schema differences: standalone vs XDR connector

Documents field mapping differences, CompromisedEntity behavior changes, and alert filtering/scoping differences

Doc (behavioral/change reference)

Feb 4, 2026 (last updated)

Defender incident investigation: Blast radius analysis

Graph visualization built on Sentinel data lake + graph for propagation path analysis

Preview (per Defender XDR release notes)

Sep 2025 (release notes section)

Advanced hunting: Hunting graph

Graph rendering of predefined threat scenarios in advanced hunting

Preview (per Defender XDR release notes)

Sep 2025 (release notes section)

Sentinel repositories API version retirement

“Call to action” to update API versions: older versions retired June 1, 2026; enforcement June 15, 2026 for actions

Dates explicitly stated

March 2026 (noticed); Jun 1 / Jun 15, 2026 (deadline/enforcement)

Technical architecture and integrations

Unified reference architecture

Microsoft’s official integration documentation describes two “centers of gravity” depending on how you operate:

  • In Defender portal mode, Sentinel data is ingested alongside organizational data into the Defender portal, enabling SOC teams to analyze and respond from a unified surface.
  • In Azure portal mode, Defender XDR incidents/alerts flow via Sentinel connectors and analysts work across both experiences.

 

Integration model: Defender suite and third-party security tools

The Defender XDR integration doc is explicit about:

  • Supported Defender components whose alerts appear through the integration (Defender for Endpoint, Identity, Office 365, Cloud Apps), plus other services such as Purview DLP and Entra ID Protection.
  • Behavior when onboarding Sentinel to the Defender portal with Defender XDR licensing: the Defender XDR connector is automatically set up and component alert-provider connectors are disconnected.
  • Expected latency: Defender XDR incidents typically appear in Sentinel UI/API within ~5 minutes, with additional lag before securityIncident ingestion is complete.
  • Cost model: Defender XDR alerts and incidents that populate SecurityAlert / SecurityIncident are synchronized at no charge, while other data types (for example, Advanced Hunting tables) are charged.

For third-party tools, Microsoft’s monthly “What’s new” explicitly calls out new GA out-of-the-box connectors/solutions (examples include Mimecast audit logs, Vectra AI XDR, and Proofpoint POD email security) as part of an expanding connector ecosystem intended to unify visibility across cloud, SaaS, and on-premises environments.

Telemetry, schemas, analytics, automation, and APIs

Data flows and ingestion engineering

CCF Push and the “push connector” ingestion path

Microsoft’s CCF Push announcement frames the “old” model as predominantly polling-based (Sentinel periodically fetching from partner/customer APIs) and introduces push-based connectors where partners/customers send data directly to a Sentinel workspace, emphasizing that “Deploy” can auto-provision the typical prerequisites: DCE, DCR, Entra app registration + secrets, and RBAC assignments.

Microsoft also states that CCF Push is built on the Logs Ingestion API, with benefits including throughput, ingestion-time transformation, and system-table targeting.

A precise engineering description of the underlying Logs Ingestion API components (useful for your article even if your readers never build a connector) is documented in Azure Monitor:

  • Sender app authenticates via an app registration that has access to a DCR.
  • Sender sends JSON matching the DCR’s expected structure to a DCR endpoint or a DCE (DCE required for Private Link scenarios).
  • The DCR can apply a transformation to map/filter/enrich before writing to the target table.

DCR transformation (KQL)

Microsoft documents “transformations in Azure Monitor” and provides concrete sample KQL snippets for common needs such as cost reduction and enrichment.

// Keep only Critical events
source | where severity == "Critical"

// Drop a noisy/unneeded column
source | project-away RawData

// Enrich with a simple internal/external IP classification (example)
source | extend IpLocation = iff(split(ClientIp,".")[0] in ("10","192"), "Internal", "External")

These are direct examples from Microsoft’s sample transformations guidance; they are especially relevant because ingestion-time filtering is one of the primary levers for both performance and cost management in Sentinel pipelines.

A Sentinel-specific nuance: Microsoft states that Sentinel-enabled Log Analytics workspaces are not subject to Azure Monitor’s filtering ingestion charge, regardless of how much data a transformation filters (while other Azure Monitor transformation cost rules still exist in general).

Telemetry schemas and key tables you should call out

A “new announcements” article aimed at detection engineers should explicitly name the tables that are impacted by new features:

  • Copilot connector → CopilotActivity table, with a published list of record types (for example, CopilotInteraction and related plugin/workspace/prompt-book operations) and explicit role requirements to enable (Global Administrator or Security Administrator).
  • Defender XDR incident/alert sync → SecurityAlert and SecurityIncident populated at no charge; other Defender data types (Advanced Hunting event tables such as DeviceInfo/EmailEvents) are charged.
  • Sentinel onboarding to Defender advanced hunting: Sentinel alerts tied to incidents are ingested into AlertInfo and accessible in Advanced hunting; SecurityAlert is queryable even if not shown in the schema list in Defender (notable for KQL portability).
  • UEBA “core” tables (engineering relevance: query joins and tuning): IdentityInfo, BehaviorAnalytics, UserPeerAnalytics, Anomalies.
  • UEBA behaviors layer tables (new behavior abstraction): SentinelBehaviorInfo and SentinelBehaviorEntities, created only if behaviors layer is enabled.
  • Microsoft XDR Advanced Hunting lake tier ingestion GA: explicit supported tables from MDE/MDO/MDA (for example DeviceProcessEvents, DeviceNetworkEvents, EmailEvents, UrlClickEvents, CloudAppEvents) and an explicit note that MDI support will follow.

Detection and analytics: UEBA and graph

UEBA operating model and scoring

Microsoft’s UEBA documentation gives you citeable technical detail:

  • UEBA uses machine learning to build behavioral profiles and detect anomalies versus baselines, incorporating peer group analysis and “blast radius evaluation” concepts.
  • Risk scoring is described with two different scoring models: BehaviorAnalytics.InvestigationPriority (0–10) vs Anomalies.AnomalyScore (0–1), with different processing characteristics (near-real-time/event-level vs batch/behavior-level).
  • UEBA Essentials is positioned as a maintained pack of prebuilt queries (including multi-cloud anomaly detection), and Microsoft’s February 2026 update adds detail about expanded anomaly detection across Azure/AWS/GCP/Okta and the anomalies-table-powered queries.

Sentinel data lake and graph as the new “analytics substrate”

Microsoft’s data lake overview frames a two-tier model:

  • Analytics tier: high-performance, real-time analytics supporting alerting/incident management.
  • Data lake tier: centralized long-term storage for querying and Python-based analytics, designed for retention up to 12 years, with “single-copy” mirroring (data in analytics tier mirrored to lake tier).

Microsoft’s graph documentation states that if you already have Sentinel data lake, the required graph is auto-provisioned when you sign into the Defender portal, enabling experiences like hunting graph and blast radius. Microsoft also notes that while the experiences are included in existing licensing, enabling data sources can incur ingestion/processing/storage costs.

Automation: AI playbook generator details that matter technically

The playbook generator doc contains unusually concrete engineering constraints and required setup. Key technical points to carry into your article:

  • Prerequisites: Security Copilot must be enabled with SCUs available (Microsoft states SCUs aren’t billed for playbook generation but are required), and the Sentinel workspace must be onboarded to Defender.
  • Roles: Sentinel Contributor is required for authoring Automation Rules, and a Detection tuning role in Entra is required to use the generator; permissions may take up to two hours to take effect.
  • Integration Profiles: explicitly defined as Base URL + auth method + required credentials; cannot change API URL/auth method after creation; supports multiple auth methods including OAuth2 client credentials, API key, AWS auth, Bearer/JWT, etc.
  • Enhanced Alert Trigger: designed for broader coverage across Sentinel, Defender, and XDR alerts and tenant-level automation consistency.
  • Limitations: Python only, alerts as the sole input type, no external libraries, max 100 playbooks/tenant, 10-minute runtime, line limits, and separation of enhanced trigger rules from standard alert trigger rules (no automatic migration).

APIs and code/CLI (official)

Create/update a DCR with Azure CLI (official)

Microsoft documents an az monitor data-collection rule create workflow to create/update a DCR from a JSON file, which is directly relevant if your readers build their own “push ingestion” paths outside of CCF Push or need transformations not supported via a guided connector UI.

az monitor data-collection rule create \
  --location 'eastus' \
  --resource-group 'my-resource-group' \
  --name 'my-dcr' \
  --rule-file 'C:\MyNewDCR.json' \
  --description 'This is my new DCR'

 

Send logs via Azure Monitor Ingestion client (Python) (official)

Microsoft’s Azure SDK documentation provides a straightforward LogsIngestionClient pattern (and the repo samples document the required environment variables such as DCE, rule immutable ID, and stream name).

import os
from azure.identity import DefaultAzureCredential
from azure.monitor.ingestion import LogsIngestionClient

endpoint = os.environ["DATA_COLLECTION_ENDPOINT"]
rule_id = os.environ["LOGS_DCR_RULE_ID"]          # DCR immutable ID
stream_name = os.environ["LOGS_DCR_STREAM_NAME"]  # stream name in DCR

credential = DefaultAzureCredential()
client = LogsIngestionClient(endpoint=endpoint, credential=credential)

body = [
    {"Time": "2026-03-18T00:00:00Z", "Computer": "host1", "AdditionalContext": "example"}
]

# Actual upload method name/details depend on SDK version and sample specifics.
# Refer to official ingestion samples and README for the exact call.

The repo sample and README explicitly define the environment variables and the use of LogsIngestionClient + DefaultAzureCredential.

Sentinel repositories API version retirement (engineering risk)

Microsoft’s Sentinel release notes contain an explicit “call to action” that older REST API versions used for Sentinel Repositories will be retired (June 1, 2026) and that Source Control actions using older versions will stop being supported (starting June 15, 2026), recommending migration to specific versions. This is critical for “content-as-code” SOC engineering pipelines.

Migration and implementation guidance

Prerequisites and planning gates

A technically rigorous migration section should treat this as a set of gating checks. Microsoft’s transition guidance highlights several that can materially block or change behavior:

  • Portal transition has no extra cost: Microsoft explicitly states transitioning to the Defender portal has no extra cost (billing remains Sentinel consumption).
  • Data storage and privacy policies change: after onboarding, Defender XDR policies apply even when working with Sentinel data (data retention/sharing differences).
  • Customer-managed keys constraint for data lake: CMK is not supported for data stored in Sentinel data lake; even broader, Sentinel data lake onboarding doc warns that CMK-enabled workspaces aren’t accessible via data lake experiences and that data ingested into the lake is encrypted with Microsoft-managed keys.
  • Region and data residency implications: data lake is provisioned in the primary workspace’s region and onboarding may require consent to ingest Microsoft 365 data into that region if it differs.
  • Data appearance lag when switching tiers: enabling ingestion for the first time or switching between tiers can take 90–120 minutes for data to appear in tables.

Step-by-step configuration tasks for the most “new” capabilities

Enable lake-tier ingestion for Advanced Hunting tables (GA)

Microsoft’s GA announcement provides direct UI steps in the Defender portal:

  1. Defender portal → Microsoft Sentinel → Configuration → Tables
  2. Select an Advanced Hunting table (from the supported list)
  3. Data Retention Settings → choose “Data lake tier” + set retention + save

Microsoft states that this allows Defender data to remain accessible in the Advanced Hunting table for 30 days while a copy is sent to Sentinel data lake for long-term retention (up to 12 years) and graph/MCP-related scenarios.

Deploy the Microsoft 365 Copilot data connector (public preview)

Microsoft’s connector post provides the operational steps and requirements:

  • Install via Content Hub in the Defender portal (search “Copilot”, install solution, open connector page).
  • Enablement requires tenant-level Global Administrator or Security Administrator roles.
  • Data lands in CopilotActivity.
  • Ingestion costs apply based on Sentinel workspace settings or Sentinel data lake tier pricing.

Configure multi-tenant content distribution (expanded content types)

Microsoft documents:

  • Navigate to “Content Distribution” in Defender multi-tenant management portal.
  • Create/select a distribution profile; choose content types; select content; choose up to 100 workspaces per tenant; save and monitor sync results.
  • Limitations: automation rules that trigger a playbook cannot currently be distributed; alert tuning rules limited to built-in rules (for now).
  • Prerequisites: access to more than one tenant via delegated access; subscription to Microsoft 365 E5 or Office E5.

Prepare for Defender XDR connector–driven changes

Microsoft explicitly warns that incident creation rules are turned off for Defender XDR–integrated products to avoid duplicates and suggests compensating controls using Defender portal alert tuning or automation rules. It also warns that incident titles will be governed by Defender XDR correlation and recommends avoiding “incident name” conditions in automation rules (tags recommended).

Common pitfalls and “what breaks”

A strong engineering article should include a “what breaks” section, grounded in Microsoft’s own lists:

  • Schema and field semantics drift: The “standalone vs XDR connector” schema differences doc calls out CompromisedEntity behavior differences, field mapping changes, and alert filtering differences (for example, Defender for Cloud informational alerts not ingested; Entra ID below High not ingested by default).
  • Automation delays and unsupported actions post-onboarding: Transition guidance states automation rules might run up to 10 minutes after alert/incident changes due to forwarding, and that some playbook actions (like adding/removing alerts from incidents) are not supported after onboarding—breaking certain playbook patterns.
  • Incident synchronization boundaries: incidents created in Sentinel via API/Logic App playbook/manual Azure portal aren’t synchronized to Defender portal (per transition doc).
  • Advanced hunting differences after data lake enablement: auxiliary log tables are no longer available in Defender Advanced hunting once data lake is enabled; they must be accessed via data lake exploration KQL experiences.
  • CI/CD failures from API retirement: repository connection create/manage tooling that calls older API versions must migrate by June 1, 2026 to avoid action failures.

Performance and cost considerations

Microsoft’s cost model is now best explained using tiering and retention:

  • Sentinel data lake tier is designed for cost-effective long retention up to 12 years, with analytics-tier data mirrored to the lake tier as a single copy.
  • For Defender XDR threat hunting data, Microsoft states it is available in analytics tier for 30 days by default; retaining beyond that and moving beyond free windows drives ingestion and/or storage costs depending on whether you extend analytics retention or store longer in lake tier.
  • Ingesting data directly to data lake tier incurs ingestion, storage, and processing costs; retaining in lake beyond analytics retention incurs storage costs.
  • Ingestion-time transformations are a first-class cost lever, and Microsoft explicitly frames filtering as a way to reduce ingestion costs in Log Analytics.

Sample deployment checklist

Phase

Task

Acceptance criteria (engineering)

Governance

Confirm target portal strategy and dates

Internal cutover plan aligns with March 31, 2027 retirement; CI/CD deadlines tracked

Identity/RBAC

Validate roles for onboarding + automation

Required Entra roles + Sentinel roles assigned; propagation delays accounted for

Data lake readiness

Decide whether to onboard to Sentinel data lake

CMK policy alignment confirmed; billing subscription owner identified; region implications reviewed

Defender XDR integration

Choose integration mode and test incident sync

Incidents visible within expected latency; bi-directional sync fields behave as expected

Schema regression

Validate queries/rules against XDR connector schema

KQL regression tests pass; CompromisedEntity and filtering changes handled

Connector modernization

Inventory connectors; plan CCF / CCF Push transitions

Function-based connectors migration plan; legacy custom data collection API retirement addressed

Automation

Pilot AI playbook generator + enhanced triggers

Integration Profiles created; generated playbooks reviewed; enhanced trigger scopes correct

Multi-tenant operations

Configure content distribution if needed

Distribution profiles sync reliably; limitations documented; rollback/override plan exists

Outage-proofing

Update Sentinel repos tooling for API retirement

All source-control actions use recommended API versions before June 1, 2026

Use cases and customer impact

Detection and response scenarios that map to the new announcements

Copilot governance and misuse detection
The Copilot connector’s published record types enable detections for scenarios such as unauthorized plugin/workspace/prompt-book operations and anomalous Copilot interactions. Data is explicitly positioned for analytic rules, workbooks, automation, and threat hunting within Sentinel and Sentinel data lake.

Long-retention hunting on high-volume Defender telemetry (lake-first approach)
Lake-tier ingestion for Advanced Hunting tables (GA) is explicitly framed around scale, cost containment, and retrospective investigations beyond “near-real-time” windows, while keeping 30-day availability in the Advanced Hunting tables themselves.

Faster automation authoring and customization (SOAR engineering productivity)
Microsoft positions the playbook generator as eliminating rigid templates and enabling dynamic API calls across Microsoft and third-party tools via Integration Profiles, with preview-customer feedback claiming faster automation development (vendor-stated).

Multi-tenant SOC standardization (MSSP / large enterprise)
Multi-tenant content distribution is explicitly designed to replicate detections, automation, and dashboards across tenants, reducing drift and accelerating onboarding, while keeping execution local to target tenants.

Measurable benefit dimensions (how to discuss rigorously)

Most Microsoft sources in this announcement set are descriptive (not benchmark studies). A rigorous article should therefore describe what you can measure, and label any numeric claims as vendor-stated.

Recommended measurable dimensions grounded in the features as documented:

  • Time-to-detect / time-to-ingest: CCF Push is positioned as real-time, event-driven delivery vs polling-based ingestion.
  • Time-to-triage / time-to-investigate: UEBA layers (Anomalies + Behaviors) are designed to summarize and prioritize activity, with explicit scoring models and tables for query enrichment.
  • Incident queue pressure: Defender XDR grouping/enrichment is explicitly described as reducing SOC queue size and time to resolve.
  • Cost-per-retained-GB and query cost: tiering rules and retention windows define cost tradeoffs; ingestion-time transformations reduce cost by dropping unneeded rows/columns.

Vendor-stated metrics: Microsoft’s March 2026 “What’s new” roundup references an external buyer’s guide and reports “44% reduction in total cost of ownership” and “93% faster deployment times” as outcomes for organizations using Sentinel (treat as vendor marketing unless corroborated by an independent study in your environment).

Comparison of old vs new Microsoft capabilities and competitor XDR positioning

Old vs new (Microsoft)

Capability

“Older” operating model (common patterns implied by docs)

“New” model emphasized in announcements/release notes

Primary SOC console

Split experience (Azure portal Sentinel + Defender portal XDR)

Defender portal as the primary unified SecOps surface; Azure portal sunset

Incident correlation engine

Sentinel correlation features (e.g., Fusion in Azure portal)

Defender XDR correlation engine replaces Fusion for incident creation after onboarding; incident provider always “Microsoft XDR” in Defender portal mode

Automation authoring

Logic Apps playbooks + automation rules

Adds AI playbook generator (Python) + Enhanced Alert Trigger, with explicit constraints/limits

Custom ingestion

Data Collector API legacy patterns + manual DCR/DCE plumbing

CCF Push built on Logs Ingestion API; emphasizes automated provisioning and transformation support

Long retention

Primarily analytics-tier retention strategies

Data lake tier supports up to 12 years; lake-tier ingestion for AH tables GA; explicit tier/cost model

Graph-driven investigations

Basic incident graphs

Blast radius analysis + hunting graph experiences built on Sentinel data lake + graph

Competitor XDR offerings (high-level, vendor pages)

The table below is intentionally “high-level” and marks details as unspecified unless explicitly stated on the cited vendor pages.

Vendor

Positioning claims (from official vendor pages)

Notes / unspecified items

CrowdStrike

Falcon Insight XDR is positioned as “AI-native XDR” for “endpoint and beyond,” emphasizing detection/response and threat intelligence.

Data lake architecture, ingestion transformation model, and multi-tenant content distribution specifics are unspecified in cited sources.

Palo Alto Networks

Cortex XDR is positioned as integrated endpoint security with AI-driven operations and broader visibility; vendor site highlights outcome metrics in customer stories and “AI-driven endpoint security.”

Lake/graph primitives, connector framework model, and schema parity details are unspecified in cited sources.

SentinelOne

Singularity XDR is positioned as AI-powered response with automated workflows across the environment; emphasizes machine-speed incident response.

Specific SIEM-style retention tiering and documented ingestion-time transformations are unspecified in cited sources.

 

No RepliesBe the first to reply