<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Sentinel Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/bg-p/MicrosoftSentinelBlog</link>
    <description>Microsoft Sentinel Blog articles</description>
    <pubDate>Thu, 23 Apr 2026 12:21:35 GMT</pubDate>
    <dc:creator>MicrosoftSentinelBlog</dc:creator>
    <dc:date>2026-04-23T12:21:35Z</dc:date>
    <item>
      <title>Introducing the Microsoft Sentinel Training Lab. Hands-On Security Operations in Minutes</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-the-microsoft-sentinel-training-lab-hands-on/ba-p/4513274</link>
      <description>&lt;P&gt;&lt;STRONG&gt;A huge thanks to&amp;nbsp;Paul Kew - this lab wouldn't have been possible without his contributions.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security operations is one of those things that’s hard to learn from slides alone. You need to&amp;nbsp;&lt;EM&gt;feel&lt;/EM&gt; what it’s like to triage a multi-stage incident, tune a noisy detection rule, or trace an attacker pivoting from an endpoint to the cloud. That’s exactly why we built the &lt;STRONG&gt;Microsoft Sentinel Training Lab&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H2&gt;What Is It?&lt;/H2&gt;
&lt;P&gt;The &lt;A class="lia-external-url" href="https://github.com/Azure/Azure-Sentinel/blob/master/Tools/Microsoft-Sentinel-Training-Lab/README.md" target="_blank" rel="noopener"&gt;Sentinel Training Lab&lt;/A&gt; is an open-source, deploy-in-minutes training environment that gives you a fully functional Microsoft Sentinel workspace loaded with realistic attack telemetry. One click deploys everything - pre-recorded data from six different security products, custom detection rules that fire real incidents, workbooks, watchlists, and playbooks.&lt;/P&gt;
&lt;P&gt;No need to set up agents, configure connectors, or simulate attacks yourself. The lab does all of that for you so you can focus on what matters: &lt;STRONG&gt;learning how to detect, investigate, and respond&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H2&gt;What’s Inside?&lt;/H2&gt;
&lt;P&gt;The lab simulates a &lt;STRONG&gt;multi-stage attack&lt;/STRONG&gt; that spans six data sources — just like what a real SOC analyst would encounter:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;CrowdStrike&lt;/STRONG&gt; — endpoint detections (malware execution, credential dumping)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Palo Alto Networks&lt;/STRONG&gt; — firewall logs (port scans, data exfiltration, C2 traffic)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Okta&lt;/STRONG&gt; — identity events (account takeover, MFA manipulation)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AWS CloudTrail&lt;/STRONG&gt; — cloud activity (IAM escalation, backdoor accounts)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;GCP Audit Logs&lt;/STRONG&gt; — cloud infrastructure abuse (service account creation, firewall changes)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MailGuard365&lt;/STRONG&gt; — email security (phishing campaigns bypassing filters)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;All of this data feeds into &lt;STRONG&gt;22 custom detection rules&lt;/STRONG&gt; that automatically generate a unified, multi-stage incident in Microsoft Defender XDR - with correlated alerts, entity graphs, and a full kill chain mapped to MITRE ATT&amp;amp;CK.&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;The Exercises&lt;/H2&gt;
&lt;P&gt;The lab comes with &lt;STRONG&gt;16 guided exercises&lt;/STRONG&gt; covering the full spectrum of security operations:&lt;/P&gt;
&lt;H3&gt;Getting Started&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Onboarding&lt;/STRONG&gt; — Set up your workspace and deploy the lab in under 30 minutes&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 1&lt;/STRONG&gt; — Explore your data with Advanced Hunting and create your first detection rule&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 2&lt;/STRONG&gt; — Enable Microsoft Defender Threat Intelligence and query IOCs&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 3&lt;/STRONG&gt; — Visualise your detection coverage on the MITRE ATT&amp;amp;CK matrix&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 4&lt;/STRONG&gt; — Automate incident enrichment with automation rules&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Detection Engineering&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 5&lt;/STRONG&gt; — Cross-platform device isolation (CrowdStrike alert → MDE response)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 6&lt;/STRONG&gt; — Tune port scan detection thresholds&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 7&lt;/STRONG&gt; — Detect Okta MFA factor manipulation&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 8&lt;/STRONG&gt; — Enrich detections with watchlists&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Operations &amp;amp; Cost Management&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 9&lt;/STRONG&gt; — Monitor ingestion costs and configure threshold policies&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 10&lt;/STRONG&gt; — Manage table tiers and retention settings&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Data Lake&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 11&lt;/STRONG&gt; — Create KQL jobs to aggregate data lake telemetry&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 12&lt;/STRONG&gt; — Compare real-time vs data lake detection approaches&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 13&lt;/STRONG&gt; — Interactive Jupyter notebook investigations&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Advanced&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 14&lt;/STRONG&gt; — 10 AI-powered prompts demonstrating the Sentinel MCP Server&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 15&lt;/STRONG&gt; — Federate external data from ADLS Gen2&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exercise 16&lt;/STRONG&gt; — Split transformation to route data between Analytics and data Lake tiers&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;What Makes This Different?&lt;/H2&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 98.1481%; height: 357.334px; border-width: 1px;"&gt;&lt;thead&gt;&lt;tr style="height: 38.6667px;"&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Feature&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;What it means for you&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr style="height: 38.6667px;"&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;&lt;STRONG&gt;One-click deployment&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;Deploy to Azure button — no manual configuration&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.6667px;"&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Realistic multi-source data&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;Six security products generating correlated incidents&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.6667px;"&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;&lt;STRONG&gt;22 detection rules&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;Pre-built rules that fire real XDR incidents with entity mapping&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.6667px;"&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;&lt;STRONG&gt;MITRE ATT&amp;amp;CK coverage&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;10 tactics covered across the attack chain&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.6667px;"&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Data lake exercises&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;KQL jobs, notebooks, federation, and split transformations&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.6667px;"&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;&lt;STRONG&gt;MCP Server prompts&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.6667px;"&gt;
&lt;P&gt;AI-powered investigation with GitHub Copilot&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 86.667px;"&gt;&lt;td style="height: 86.667px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Cost management&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 86.667px;"&gt;
&lt;P&gt;Threshold policies and tier optimisation guidance&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.0287%" /&gt;&lt;col style="width: 50.0287%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H2&gt;Getting Started&lt;/H2&gt;
&lt;P&gt;Ready to try it? Here’s all you need:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;An Azure subscription (free trial works)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Owner or Contributor role on the subscription&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;A Microsoft Sentinel workspace onboarded to Defender XDR&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Then head to the repo, follow the Onboarding guide and click &lt;STRONG&gt;Deploy to Azure&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;The deployment takes about 30 minutes. After that, your workspace will have ingested data, detection rules firing incidents, and all 16 exercises ready to go.&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;Open Source &amp;amp; Community&lt;/H2&gt;
&lt;P&gt;The entire lab is open source under the &lt;A href="https://github.com/Azure/Azure-Sentinel" target="_blank" rel="noopener"&gt;Azure/Azure-Sentinel&lt;/A&gt; repository. Contributions, feedback, and ideas are welcome. If you find something that could be better, open an issue or submit a PR.&lt;/P&gt;
&lt;P&gt;We built this lab because we believe the best way to learn security operations is by doing. We hope it helps you — whether you’re defending your first tenant or your hundredth.&lt;/P&gt;
&lt;P&gt;Get started now&lt;STRONG&gt; -&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://github.com/Azure/Azure-Sentinel/blob/master/Tools/Microsoft-Sentinel-Training-Lab/README.md" target="_blank"&gt;Azure-Sentinel/Tools/Microsoft-Sentinel-Training-Lab/README.md at master · Azure/Azure-Sentinel&lt;/A&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 08:50:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-the-microsoft-sentinel-training-lab-hands-on/ba-p/4513274</guid>
      <dc:creator>AndreasKapetaniou</dc:creator>
      <dc:date>2026-04-23T08:50:24Z</dc:date>
    </item>
    <item>
      <title>Enforce Cost Limits on KQL Queries and Notebooks in the Microsoft Sentinel Data Lake</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/enforce-cost-limits-on-kql-queries-and-notebooks-in-the/ba-p/4511329</link>
      <description>&lt;P&gt;Security teams face a constant tension: run the advanced analytics you need to stay ahead of threats, or hold back to keep costs predictable. Until now, Microsoft Sentinel let you set alerts to get notified when data lake usage approached a threshold — useful for awareness, but not enough to prevent budget overruns.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Today, we're excited to announce&amp;nbsp;&lt;STRONG&gt;threshold enforcement for KQL queries and notebooks in the Microsoft Sentinel data lake&lt;/STRONG&gt;. With this release, you can go beyond notifications and automatically block new queries and jobs when your configured usage limits are exceeded. Your analysts keep working confidently, and your budgets stay protected.&lt;/P&gt;
&lt;H2&gt;&lt;U&gt;What's new&lt;/U&gt;&lt;/H2&gt;
&lt;P&gt;Previously, the Configure Policies experience in Microsoft Sentinel let you set threshold-based alerts for data lake usage. You'd receive an email notification when consumption approached a limit — but nothing stopped usage from continuing past that point.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, you can enable&amp;nbsp;&lt;STRONG&gt;enforcement&lt;/STRONG&gt;&amp;nbsp;on those same policies. When enforcement is turned on and a threshold is exceeded, Microsoft Sentinel blocks new queries, jobs, and notebook sessions with a clear "Limit exceeded" error. No more surprise cost spikes from runaway queries or analysts who mistakenly run heavy workloads against data lake data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enforcement is supported for two data lake capability categories:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Data Lake Query&lt;/STRONG&gt; — interactive KQL queries and KQL jobs (scheduled and ad hoc)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Advanced Data Insights&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&amp;nbsp;— notebook runs and notebook jobs&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;U&gt;How it works&lt;/U&gt;&lt;/H2&gt;
&lt;H4&gt;Consistent controls across KQL queries and notebooks&lt;/H4&gt;
&lt;P&gt;Cost controls are enforced consistently across Sentinel data lake workloads, regardless of how analysts access the data. The same policy applies whether someone is running a quick investigation or executing a long-running job.&lt;/P&gt;
&lt;P&gt;Controls apply to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Interactive KQL queries in the data lake explorer in the Defender portal&lt;/LI&gt;
&lt;LI&gt;KQL jobs, including scheduled and ad-hoc jobs&lt;/LI&gt;
&lt;LI&gt;Notebook queries run through the Microsoft Sentinel VS Code extension&lt;/LI&gt;
&lt;LI&gt;Notebook jobs running as background or scheduled workloads&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This ensures advanced analytics remain powerful — but predictable and governed.&lt;/P&gt;
&lt;H4&gt;Clear enforcement without disruption&lt;/H4&gt;
&lt;P&gt;Enforcement is applied at execution and validation boundaries — not retroactively. This means:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Queries or jobs already running are not interrupted.&lt;/STRONG&gt; In-flight work completes normally.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;New queries, jobs, or notebook sessions are blocked&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; once limits are exceeded.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Failures occur early &lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;(for example, during validation), avoiding wasted compute.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;From an analyst's perspective, enforcement is explicit and consistent. Clear messaging appears in query editors, job validation responses, and notebooks when limits are reached — so your team always understands what happened and what to do next.&lt;/P&gt;
&lt;H2&gt;&lt;BR /&gt;&lt;U&gt;How to set it up&lt;/U&gt;&lt;/H2&gt;
&lt;H4&gt;Prerequisites&lt;/H4&gt;
&lt;P&gt;To configure enforcement policies, ensure you have the necessary permissions that are outlined here: &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/billing-monitor-costs?source=recommendations#microsoft-sentinel-cost-management-in-the-microsoft-defender-portal" target="_blank" rel="noopener"&gt;Manage and monitor costs for Microsoft Sentinel | Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Where to access&lt;/H4&gt;
&lt;P&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Microsoft Sentinel &amp;gt; Cost management &amp;gt; Configure Policies&lt;/STRONG&gt; in the Microsoft Defender portal (&lt;U&gt;https://security.microsoft.com&lt;/U&gt;).&lt;/P&gt;
&lt;H4&gt;Step-by-step configuration&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;In&amp;nbsp;&lt;STRONG&gt;Microsoft Sentinel &amp;gt; Cost management&lt;/STRONG&gt;, select&amp;nbsp;&lt;STRONG&gt;Configure Policies&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select the policy you want to edit (Data Lake Query or Advanced Data Insights).&lt;/LI&gt;
&lt;LI&gt;Enter the&amp;nbsp;&lt;STRONG&gt;total threshold value&lt;/STRONG&gt;&amp;nbsp;for the policy.&lt;/LI&gt;
&lt;LI&gt;Enter an&amp;nbsp;&lt;STRONG&gt;alert percentage&lt;/STRONG&gt;&amp;nbsp;to receive email notifications before the threshold is reached.&lt;/LI&gt;
&lt;LI&gt;Enable the&amp;nbsp;&lt;STRONG&gt;Enforcement&lt;/STRONG&gt;&amp;nbsp;toggle to block usage after the threshold is exceeded.&lt;/LI&gt;
&lt;LI&gt;Review your settings and select&amp;nbsp;&lt;STRONG&gt;Submit&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Once enforcement is active, administrators receive advance notifications as usage approaches the threshold. If circumstances change — for example, during an active breach — you can adjust the threshold, disable enforcement temporarily, or modify the policy to give your SOC the room it needs to respond without being blocked.&lt;/P&gt;
&lt;H2&gt;&lt;U&gt;Real-world scenario: Preventing unexpected cost spikes&lt;/U&gt;&lt;/H2&gt;
&lt;P&gt;Consider a large SOC that ingests roughly 6 TB of data per day, with 1 TB going to the Sentinel Analytics tier and the remaining 5 TB going to the Sentinel data lake. Analysts are proactively hunting for threats, performing investigations, and running automation. Tier 3 analysts are also running Jupyter Notebooks against the Sentinel data lake to build graphs, execute queries, and automate incident investigation and remediation with code.&lt;/P&gt;
&lt;P&gt;Last month, the SOC experienced a cost spike after a newly hired analyst ran large, frequent queries against data lake data — mistakenly thinking it was Analytics tier. The SOC manager needs to prevent this from happening again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With enforcement now available, the SOC manager can navigate to&amp;nbsp;&lt;STRONG&gt;Microsoft Sentinel &amp;gt; Cost management &amp;gt; Configure Policies&lt;/STRONG&gt;&amp;nbsp;in the Defender portal and set up two policies:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A &lt;STRONG&gt;Data Lake Query&lt;/STRONG&gt;&amp;nbsp;policy to cap data processing for KQL queries&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;An &lt;STRONG&gt;Advanced Data Insights&lt;/STRONG&gt;&amp;nbsp;policy to cap notebook compute consumption&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With these policies in place, the SOC manager gets notified in advance when consumption approaches the threshold while having confidence that the thresholds set will be enforced to prevent unexpected consumption and cost. Analysts can continue their day-to-day work without worrying about accidental overages. Should a breach scenario demand more capacity, the SOC manager can quickly adjust or temporarily disable the policies — keeping the team unblocked while maintaining overall budget governance. Outside of a breach scenario, should the same SOC analyst generate large amounts of data scanned, the threshold will take action and prevent queries from being performed.&lt;/P&gt;
&lt;H2&gt;Learn more&lt;/H2&gt;
&lt;P&gt;With enforceable KQL and notebook guardrails, Microsoft Sentinel data lake helps security teams scale advanced analytics with confidence. You can control usage in production and keep investigations moving — without tradeoffs between visibility, analytics, and budget.&lt;/P&gt;
&lt;P&gt;To get started, visit the documentation:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/billing-monitor-costs?source=recommendations#notification" target="_blank" rel="noopener"&gt;Manage and monitor costs for Microsoft Sentinel | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We'd love to hear your feedback. Share your thoughts in the comments below or reach out through your usual Microsoft support channels.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 20:26:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/enforce-cost-limits-on-kql-queries-and-notebooks-in-the/ba-p/4511329</guid>
      <dc:creator>shubh_khandhadia</dc:creator>
      <dc:date>2026-04-15T20:26:56Z</dc:date>
    </item>
    <item>
      <title>Running KQL queries on Microsoft Sentinel data lake using API</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/running-kql-queries-on-microsoft-sentinel-data-lake-using-api/ba-p/4503128</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;Co-Authors: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-user" href="https://techcommunity.microsoft.com/users/zeinab%20mokhtarian%20koorabbasloo/218831" target="_blank" rel="noopener" data-lia-auto-title="Zeinab Mokhtarian Koorabbasloo" data-lia-auto-title-active="0"&gt;Zeinab Mokhtarian Koorabbasloo&lt;/A&gt; and &lt;A class="lia-internal-link lia-internal-url lia-internal-url-user" href="https://techcommunity.microsoft.com/users/matt_lowe/572591" target="_blank" rel="noopener" data-lia-auto-title="Matthew Lowe" data-lia-auto-title-active="0"&gt;Matthew Lowe&lt;/A&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;As security data lakes become the backbone of modern analytics platforms, organizations need new ways to operationalize their data. While interactive tools and portals support data exploration, many real-world workflows increasingly require flexible programmatic access that enables automation, scale, and seamless integration.&lt;/P&gt;
&lt;P&gt;By running KQL (Kusto Query Language) queries on Microsoft Sentinel data lake through APIs, you can embed analytics directly into automation workflows, background services, and intelligent agents, without relying on manual query execution.&lt;/P&gt;
&lt;P&gt;In this post, we explore API based KQL query execution, review some of the scenarios where it delivers the most value, and what you need to get started.&lt;/P&gt;
&lt;H4&gt;Why run KQL queries on Sentinel data lake via API?&lt;/H4&gt;
&lt;P&gt;Traditional query experiences, such as dashboards and query editors, are optimized for human interaction. APIs, on the other hand, are optimized for systems.&lt;/P&gt;
&lt;P&gt;Running KQL through an API enables:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Automation-first analytics&lt;/LI&gt;
&lt;LI&gt;Repeatable and scheduled insights&lt;/LI&gt;
&lt;LI&gt;Integration with external systems and agents&lt;/LI&gt;
&lt;LI&gt;Consistent query execution at scale&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Instead of asking &lt;EM&gt;“How do I run this query?”&lt;/EM&gt;, our customers are asking &lt;EM&gt;“How do I embed analytics into my workflow?”&lt;/EM&gt;&lt;/P&gt;
&lt;H4&gt;Scenarios where API-based KQL queries add value&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Automated monitoring and alerting&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;SOC teams often want to continuously analyze data in their lake to detect anomalies, trends, or policy violations.&lt;/P&gt;
&lt;P&gt;With API-based KQL execution, they can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Run queries as part of automated workflows and playbooks&lt;/LI&gt;
&lt;LI&gt;Evaluate query results programmatically&lt;/LI&gt;
&lt;LI&gt;Trigger downstream actions such as alerts, tickets, or notifications&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This turns KQL into a signal engine, not just an exploration tool.&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; Powering intelligent agents&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;AI agents require programmatic access to data lakes to retrieve timely, relevant context for decision making. Using KQL over an API allows agents to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Dynamically query data lake based on user intent or system context&lt;/LI&gt;
&lt;LI&gt;Retrieve aggregated or filtered results on demand&lt;/LI&gt;
&lt;LI&gt;Combine analytical results with reasoning and decision logic&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In this model, KQL acts as the analytical retrieval layer, while the agent focuses on orchestration, reasoning, and action.&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; Embedding analytics into business workflows&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Many organizations want analytics embedded directly into CI/CD and operational pipelines. Instead of exporting data or duplicating logic, they can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Run KQL queries inline via API&lt;/LI&gt;
&lt;LI&gt;Use results as inputs to other systems&lt;/LI&gt;
&lt;LI&gt;Keep analytics logic centralized and consistent&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This reduces drift between “analytics code” and “application code.”&lt;/P&gt;
&lt;H4&gt;High-level flow: What happens when you run KQL via API&lt;/H4&gt;
&lt;P&gt;At a conceptual level, the flow looks like this:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;A client authenticates to Microsoft Sentinel data lake platform.&lt;/LI&gt;
&lt;LI&gt;The client submits a KQL query via an API.&lt;/LI&gt;
&lt;LI&gt;The query executes against data stored in the data lake.&lt;/LI&gt;
&lt;LI&gt;Results are returned in a structured, machine-readable format.&lt;/LI&gt;
&lt;LI&gt;The client processes or acts on the results.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;Prerequisites&lt;/H4&gt;
&lt;P&gt;To run KQL queries against the Sentinel data lake using APIs, you will need:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A user token or a service principal&lt;/LI&gt;
&lt;LI&gt;Appropriate permissions to execute queries on the Sentinel data lake. Azure RBAC roles such as Log Analytics reader or Log Analytics contributor on the workspace are needed.&lt;/LI&gt;
&lt;LI&gt;Familiarity with KQL and API based query execution patterns&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Scenario 1: Execute a KQL query via API within a Playbook&lt;/H4&gt;
&lt;P&gt;The following Sentinel SOAR playbook example demonstrates how data within Sentinel data lake can be used within automation. This example leverages a service principal that will be used to query the DeviceNetworkEvent logs that are within Sentinel data lake to enrich an incident involving a device before taking action on it.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Within this playbook, the entities involved within the incident are retrieved, then queries are executed against the Sentinel data lake to gain insights on each host involved. For this example, the API call to the Sentinel data lake to retrieve events from the DeviceNetworkEvents table to find relevant information that shows network connections with the host where the IP originated from outside of the United States.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As this action does not have a gallery artifacts within Azure Logic Apps, the action must be built out by using the HTTP action that is offered within Logic Apps. This action requires the API details for the API call as well as the authentication details that will be used to run the API. The step that executes the query leverages the Sentinel data lake API by performing the following call: POST &lt;A class="lia-external-url" href="https://api.securityplatform.microsoft.com/lake/kql/v2/rest/query" target="_blank" rel="noopener"&gt;https://api.securityplatform.microsoft.com/lake/kql/v2/rest/query&lt;/A&gt;. The service principal being used has read permissions on the Sentinel data lake that contains the relevant details and is authenticating to Entra ID OAuth when running the API call.&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;NOTE: When using API calls to query Sentinel data lake, use 4500ebfb-89b6-4b14-a480-7f749797bfcd/.default as the scope/audience when retrieving a token for the service principal. This GUID is associated with the query service for Sentinel data lake.&lt;/P&gt;
&lt;P&gt;The body of the query is the following:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;{
"csl": "DeviceNetworkEvents | where TimeGenerated &amp;gt;= ago(30d) | where DeviceName has '' | where ActionType in (\"ConnectionSuccess\", \"ConnectionAttempted\", \"InboundConnectionAccepted\") | extend GeoInfo = geo_info_from_ip_address(RemoteIP) | extend Country = tostring(GeoInfo.country), State = tostring(GeoInfo.state), City = tostring(GeoInfo.city) | where Country != 'United States' and RemoteIP !has '127.0.0.1' | project TimeGenerated, DeviceName, ActionType, RemoteIP, RemotePort, RemoteUrl, City, State, Country, InitiatingProcessFileName | order by TimeGenerated desc | top 2 by DeviceName", “db”: “WORKSPACENAMEHERE – WORKSPACEIDHERE”
}
&lt;/LI-CODE&gt;
&lt;P&gt;Within this body, the query and workspace are defined. “csl” represents the query to run against the Sentinel data lake and “db” represents the Sentinel workspace/lake. This value is a combination of the workspace name – workspace ID. Both of these values can be found on the workspace overview blade within Azure.&lt;/P&gt;
&lt;P&gt;NOTE: The query must be one line in the JSON. Multi-line items will not be seen as valid JSON.&lt;/P&gt;
&lt;P&gt;With this, initial investigative querying via Sentinel data lake has been done the moment that the incident is triggered, allowing the SOC analyst responding to expediate their investigation and validating that the automated action of disabling the account was justified. For this Playbook, the results gathered from Sentinel data lake were placed into a comment and added to the incident within Defender, allowing SOC analysts to quickly review relevant details when beginning their work:&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;Scenario 2: Execute a KQL query via API in code&lt;/H4&gt;
&lt;P&gt;The following Python example demonstrates how to use a service principal to execute a KQL query on the Sentinel data lake via API. This example is provided for illustration purposes, but you can also call the API directly via common API tools. Within the code, the query and workspace are defined. “csl” represents the query to run against the Sentinel data lake and “db” represents the Sentinel workspace/lake. This value is a combination of the workspace name – workspace ID. Both of these values can be found on the workspace overview blade within Azure.&lt;/P&gt;
&lt;P&gt;You also need to use a token or a service principal.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;import requests
import msal

# ====== SPN / Entra app settings ======
TENANT_ID = ""
CLIENT_ID = ""
CLIENT_SECRET = ""

# Token authority
AUTHORITY = f"https://login.microsoftonline.com/{TENANT_ID}"

# ---- IMPORTANT ----
# Most APIs use the resource + "/.default" pattern for client-credentials.
# Try this first:
SCOPE = ["4500ebfb-89b6-4b14-a480-7f749797bfcd/.default"]

# ====== KQL query payload ======
KQL_QUERY = {
    "csl": "SigninLogs| take 10",
    "db": " workspace1-12345678-abcd-abcd-1234-1234567890ab ",
    "properties": {
        "Options": {
            "servertimeout": "00:04:00",
            "queryconsistency": "strongconsistency",
            "query_language": "kql",
            "request_readonly": False,
            "request_readonly_hardline": False
        }
    }
}
# ====== Acquire token using client credentials ======
app = msal.ConfidentialClientApplication(
    client_id=CLIENT_ID,
    authority=AUTHORITY,
    client_credential=CLIENT_SECRET
)

result = app.acquire_token_for_client(scopes=SCOPE)

if "access_token" not in result:
    raise RuntimeError(
        f"Token acquisition failed: {result.get('error')} - {result.get('error_description')}"
    )

access_token = result["access_token"]

# ====== Call the KQL API ======
headers = {
    "Authorization": f"Bearer {access_token}",
    "Content-Type": "application/json"
}

url = "https://api.securityplatform.microsoft.com/lake/kql/v2/rest/query"  # same endpoint
response = requests.post(url, headers=headers, json=KQL_QUERY)

if response.status_code == 200:
    print("Query Results:")
    print(response.json())
else:
    print(f"Error {response.status_code}: {response.text}")
&lt;/LI-CODE&gt;
&lt;P&gt;In summary, you need the following parameters in your API call:&lt;/P&gt;
&lt;P&gt;Request URI: https://api.securityplatform.microsoft.com/lake/kql/v2/rest/query&lt;/P&gt;
&lt;P&gt;Method: POST&lt;/P&gt;
&lt;P&gt;Sample payload:&lt;/P&gt;
&lt;LI-CODE lang=""&gt;{
    "csl": " SigninLogs | take 10",
    "db": "workspace1-12345678-abcd-abcd-1234-1234567890ab",

 }
&lt;/LI-CODE&gt;
&lt;H4&gt;Limitations and considerations&lt;/H4&gt;
&lt;P&gt;The following considerations should be considered when planning to execute KQL queries on a data lake:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Service principal permissions&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;When using a service principal, Azure RBAC roles can be assigned at the Sentinel workspace level. Entra ID roles or XDR unified RBAC role are not supported for this scenario. Alternatively, user tokens with Entra ID roles can be used.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Result size limits&lt;/STRONG&gt;&lt;BR /&gt;Queries are subject to limits on execution time and response size. Review Microsoft Sentinel data lake &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-lake-service-limits#service-parameters-and-limits-for-kql-queries-in-the-lake-tier" target="_blank" rel="noopener"&gt;query service limits&lt;/A&gt; when designing your workflows.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Summary&lt;/H4&gt;
&lt;P&gt;Running KQL queries on Sentinel data lake via APIs unlocks a new class of scenarios, from intelligent agents to fully automated analytics pipelines. By decoupling query execution from user interfaces, customers gain flexibility, scalability, and control over how insights are generated and consumed.&lt;/P&gt;
&lt;P&gt;If you’re already using KQL for interactive analysis, API access is the natural next step toward production grade analytics.&lt;/P&gt;
&lt;P&gt;Happy hunting!&lt;/P&gt;
&lt;H4&gt;Resources&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Run KQL queries on Sentinel data lake: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/kql-queries" target="_blank" rel="noopener"&gt;Run KQL queries against the Microsoft Sentinel data lake - Microsoft Security | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Service parameters and limits: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-lake-service-limits#service-parameters-and-limits-for-kql-queries-in-the-lake-tier" target="_blank" rel="noopener"&gt;Microsoft Sentinel data lake service limits - Microsoft Security | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 14 Apr 2026 17:15:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/running-kql-queries-on-microsoft-sentinel-data-lake-using-api/ba-p/4503128</guid>
      <dc:creator>Zeinab Mokhtarian Koorabbasloo</dc:creator>
      <dc:date>2026-04-14T17:15:33Z</dc:date>
    </item>
    <item>
      <title>Microsoft Sentinel data federation: Expand visibility while preserving governance</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-data-federation-expand-visibility-while/ba-p/4511258</link>
      <description>&lt;P&gt;Security data volumes are growing faster than ever, but visibility across the entire digital estate hasn’t kept pace. As organizations expand across cloud, hybrid, and SaaS environments, critical security-relevant data is increasingly stored across multiple data stores due to governance and compliance requirements.&lt;/P&gt;
&lt;P&gt;Microsoft understands this reality. &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/data-federation-overview" target="_blank"&gt;Microsoft Sentinel data federation&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;now in public preview,&lt;STRONG&gt; &lt;/STRONG&gt;is designed to meet customers where their data already lives, while preserving governance. Powered by Microsoft Fabric, customers can federate data from Microsoft Fabric, Azure Data Lake Storage (ADLS) Gen 2, and Azure Databricks into Sentinel data lake—without copying or duplicating the data. Security teams can analyze data in place, unifying detections, investigations, and hunting across a broader digital estate, while data owners retain full ownership and policies remain intact.&lt;/P&gt;
&lt;H1&gt;Sentinel data federation benefit&lt;/H1&gt;
&lt;P&gt;Data federation ensures security data remains at its source while appearing seamlessly alongside native Sentinel data in the Sentinel data lake.&lt;/P&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;This allows security teams to work with governed data confidently—without duplicating data or disrupting existing data ownership and compliance models.&lt;/LI&gt;
&lt;LI&gt;Using familiar Sentinel tools such as KQL hunting, notebooks, and custom graphs, teams can correlate signals, investigate incidents, and hunt across federated and ingested data in a unified experience. Analysts can seamlessly connect signals across domains and accelerate investigations.&lt;/LI&gt;
&lt;LI&gt;By running analytics on federated data first, customers can evaluate which datasets consistently deliver security value. Over time, high‑value data can be ingested into Sentinel data lake to unlock deeper detections, automation, and AI‑driven insights.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Sentinel data federation allows security teams to start broad, stay governed, and scale security analytics with clarity.&lt;/P&gt;
&lt;H1&gt;Customer use cases enabled by Sentinel data federation&lt;/H1&gt;
&lt;H3&gt;Cross-domain threat hunting across the enterprise&lt;/H3&gt;
&lt;P&gt;With Sentinel data federation, Sentinel becomes the orchestration layer for advanced security analytics, not just a repository for ingested data.&lt;/P&gt;
&lt;P&gt;By querying external data sources in place, security teams can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Run single KQL threat hunts that span Sentinel-native tables and federated data sources.&lt;/LI&gt;
&lt;LI&gt;Correlate security signals with business, identity, fraud, and application telemetry that may never be ingested into Sentinel.&lt;/LI&gt;
&lt;LI&gt;Perform investigations across years of historical data without migrating or reshaping it.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This enables SOC teams to move beyond siloed investigations and uncover patterns that only emerge when data is analyzed across the full digital estate.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;“Microsoft leads the market in cloud‑native SIEM. Now with support for data federation, Sentinel is enabling security teams to analyze security data wherever it lives, preserving governance. For customers and managed security providers alike, this marks a pivotal shift in what a modern cloud SIEM can enable."&lt;/P&gt;
&lt;P&gt;—&amp;nbsp;&lt;STRONG&gt;Micah Heaton |&lt;/STRONG&gt; &lt;STRONG&gt;Strategy Leader at BlueVoyant&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3&gt;AI-ready tooling for advanced security analytics&lt;/H3&gt;
&lt;P&gt;By extending Sentinel’s security knowledge layer across federated data, customers can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Leverage Sentinel custom graphs and AI/MCP tools to run analytics across federated and ingested data together.&lt;/LI&gt;
&lt;LI&gt;Deliver immediate investigative value to SOC teams by enriching incidents with broader context.&lt;/LI&gt;
&lt;LI&gt;Enable data scientists and advanced analysts to perform iterative threat discovery without copying or staging massive datasets into the Sentinel data lake.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This approach allows customers to apply advanced analytics and AI techniques to security problems at scale, while preserving governance and avoiding unnecessary data movement.&lt;/P&gt;
&lt;H1&gt;Data federation as a path to deeper Sentinel value&lt;/H1&gt;
&lt;P&gt;Data federation is not a replacement for ingestion, it’s a &lt;STRONG&gt;governance-first approach&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Many customers follow a natural progression:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Federate&lt;/STRONG&gt; data to explore and investigate&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identify high-value signals&lt;/STRONG&gt; through real investigations&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ingest valuable security data&lt;/STRONG&gt; into Sentinel data lake overtime&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unlock detections, automation, and AI-powered insights &lt;/STRONG&gt;at scale&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This approach helps customers realize Sentinel value earlier while setting them up for long-term success.&lt;/P&gt;
&lt;H1&gt;Learn more&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel/?msockid=302788a71aaf677a36549fae1bf06650" target="_blank"&gt;Microsoft Sentinel—AI-Ready Platform&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/playlist?list=PL3ZTgFEc7LyvM-OlDTB8BDV_aARfmBMG9" target="_blank"&gt;Microsoft Sentinel data lake - YouTube&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/data-federation-overview" target="_blank"&gt;Data federation overview in Microsoft Sentinel data lake&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/using-data-federation" target="_blank"&gt;Use federated data sources in Microsoft Sentinel&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://youtu.be/pDA80Gr-0xc?si=GZzwafxpho8s0dy4" target="_blank"&gt;Sentinel data federation ninja training&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/microsoft-sentinel-data-lake-faq/4457728" target="_blank"&gt;Microsoft Sentinel data lake FAQ blog&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 14 Apr 2026 16:11:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-data-federation-expand-visibility-while/ba-p/4511258</guid>
      <dc:creator>chaitra_satish</dc:creator>
      <dc:date>2026-04-14T16:11:29Z</dc:date>
    </item>
    <item>
      <title>How to Ingest Microsoft Intune Logs into Microsoft Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/how-to-ingest-microsoft-intune-logs-into-microsoft-sentinel/ba-p/4508562</link>
      <description>&lt;P&gt;For many organizations using Microsoft Intune to manage devices, integrating Intune logs into Microsoft Sentinel is an essential for security operations (Incorporate the device into the SEIM). By routing Intune’s device management and compliance data into your central SIEM, you gain a unified view of endpoint events and can set up alerts on critical Intune activities e.g. devices falling out of compliance or policy changes. This unified monitoring helps security and IT teams detect issues faster, correlate Intune events with other security logs for threat hunting and improve compliance reporting. We’re publishing these best practices to help unblock common customer challenges in configuring Intune log ingestion. In this step-by-step guide, you’ll learn how to successfully send Intune logs to Microsoft Sentinel, so you can fully leverage Intune data for enhanced security and compliance visibility.&lt;/P&gt;
&lt;H2&gt;Prerequisites and Overview&lt;/H2&gt;
&lt;P&gt;Before configuring log ingestion, ensure the following prerequisites are in place:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Sentinel Enabled Workspace&lt;/STRONG&gt;: A Log Analytics Workspace with Microsoft Sentinel enabled; For information regarding setting up a workspace and onboarding Microsoft Sentinel, see: &lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/sentinel/quickstart-onboard?tabs=defender-portal" target="_blank" rel="noopener"&gt;Onboard Microsoft Sentinel - Log Analytics workspace overview&lt;/A&gt;. Microsoft Sentinel is now available in the Defender Portal, connect your Microsoft Sentinel Workspace to the Defender Portal:&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/unified-secops/microsoft-sentinel-onboard#unified-security-operations-prerequisites" target="_blank" rel="noopener"&gt;Connect Microsoft Sentinel to the Microsoft Defender portal - Unified security operations&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Intune Administrator permissions:&lt;/STRONG&gt; You need appropriate rights to configure Intune &lt;STRONG&gt;Diagnostic Settings&lt;/STRONG&gt;. For information, see: &lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference" target="_blank" rel="noopener"&gt;Microsoft Entra built-in roles - Intune Administrator&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Log Analytics Contributor role:&lt;/STRONG&gt; The account configuring diagnostics should have permission to write to the Log Analytics workspace. For more information on the different roles, and what they can do, go to &lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/azure-monitor/logs/manage-access" target="_blank" rel="noopener"&gt;Manage access to log data and workspaces in Azure Monitor&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Intune diagnostic logging enabled:&lt;/STRONG&gt; Ensure that Intune diagnostic settings are configured to send logs to Azure Monitor / Log Analytics, and that devices and users are enrolled in Intune so that relevant management and compliance events are generated. For more information, see: &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/review-logs-using-azure-monitor" target="_blank" rel="noopener"&gt;Send Intune log data to Azure Storage, Event Hubs, or Log Analytics&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Configure Intune to Send Logs to Microsoft Sentinel&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Sign in to the &lt;A href="https://go.microsoft.com/fwlink/?linkid=2109431" target="_blank" rel="noopener"&gt;Microsoft Intune admin center&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Select&amp;nbsp;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Reports&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &amp;gt; &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Diagnostics settings&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;. If it’s the first time here, you may be prompted to “Turn on” diagnostic settings for Intune; enable it if so. Then click “+ Add diagnostic setting” to create a new setting:&lt;BR /&gt;&lt;/SPAN&gt;&lt;img&gt;&lt;EM&gt;Microsoft Intune Diagnostics settings page – Add diagnostic settings.&lt;/EM&gt;&lt;/img&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;STRONG&gt;Select Intune Log Categories.&lt;/STRONG&gt; In the “Diagnostic setting” configuration page, give the setting a name (e.g. “&lt;EM&gt;Microsoft Sentinel Intune Logs Demo&lt;/EM&gt;”). Under &lt;STRONG&gt;Logs to send&lt;/STRONG&gt;, you’ll see checkboxes for each Intune log category. Select the categories you want to forward. For comprehensive monitoring, check &lt;STRONG&gt;AuditLogs&lt;/STRONG&gt;, &lt;STRONG&gt;OperationalLogs&lt;/STRONG&gt;, &lt;STRONG&gt;DeviceComplianceOrg&lt;/STRONG&gt;, and &lt;STRONG&gt;Devices&lt;/STRONG&gt;. The selected log categories will be sent to a table in the Microsoft Sentinel Workspace.&lt;BR /&gt;&lt;/SPAN&gt;&lt;img&gt;&lt;EM&gt;Microsoft Intune Diagnostics settings page – Log categories.&lt;/EM&gt;&lt;/img&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Configure Destination Details – Microsoft Sentinel Workspace.&lt;/STRONG&gt; Under &lt;STRONG&gt;Destination details&lt;/STRONG&gt; on the same page, select your &lt;STRONG&gt;Azure Subscription&lt;/STRONG&gt; then select the &lt;STRONG&gt;Microsoft Sentinel workspace.&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;img&gt;&lt;EM&gt;Microsoft Intune Diagnostics settings page - Destination details.&lt;/EM&gt;&lt;/img&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;STRONG&gt;Save the Diagnostic Setting.&lt;/STRONG&gt; After you click save, the Microsoft Intune Logs will &amp;nbsp;will be streamed to 4 tables which are in the Analytics Tier.&amp;nbsp; For pricing on the analytic tier check here: &lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/sentinel/billing?tabs=simplified%2Ccommitment-tiers#understand-your-microsoft-sentinel-bill" target="_blank" rel="noopener"&gt;Plan costs and understand pricing and billing&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;img&gt;&lt;EM&gt;Microsoft Intune Diagnostics settings page – Saved Diagnostic settings.&lt;/EM&gt;&lt;/img&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Verify Data in Microsoft Sentinel&lt;/STRONG&gt;.&lt;EM&gt; &lt;/EM&gt;
&lt;P&gt;After configuring Intune to send diagnostic data to a Microsoft Sentinel Workspace, it’s crucial to verify that the Intune logs are successfully flowing into Microsoft Sentinel. You can do this by checking specific Intune log tables both in &lt;STRONG&gt;the Microsoft 365 Defender portal &lt;/STRONG&gt;and in the&lt;STRONG&gt; Azure Portal&lt;/STRONG&gt;. The key tables to verify are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;IntuneAuditLogs&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;IntuneOperationalLogs&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;IntuneDeviceComplianceOrg&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;IntuneDevices&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="width: 1014px; height: 655.859px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 52.125px;"&gt;&lt;td style="height: 52.125px;"&gt;
&lt;P class="lia-align-center"&gt;&lt;STRONG&gt;Microsoft 365 Defender Portal (Unified)&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 52.125px;"&gt;
&lt;P class="lia-align-center"&gt;&lt;STRONG&gt;Azure Portal (Microsoft Sentinel)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 603.734px;"&gt;&lt;td style="height: 603.734px;"&gt;
&lt;P&gt;&lt;STRONG&gt;1. &lt;/STRONG&gt;Open Advanced Hunting: Sign in to the &lt;STRONG&gt;&lt;A href="https://security.microsoft.com" target="_blank" rel="noopener"&gt;https://security.microsoft.com&lt;/A&gt;&lt;/STRONG&gt; (the unified portal). Navigate to &lt;STRONG&gt;Advanced Hunting&lt;/STRONG&gt;. &lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;– &lt;EM&gt;This opens the unified query editor where you can search across Microsoft Defender data and any connected Sentinel data.&lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2. Find Intune Tables&lt;/STRONG&gt;: In the Advanced hunting Schema pane (on the left side of the query editor), scroll down past the &lt;STRONG&gt;Microsoft Sentinel Tables&lt;/STRONG&gt;. Under the &lt;STRONG&gt;LogManagement&lt;/STRONG&gt; Section Look for &lt;STRONG&gt;IntuneAuditLogs&lt;/STRONG&gt;, &lt;STRONG&gt;IntuneOperationalLogs&lt;/STRONG&gt;, &lt;STRONG&gt;IntuneDeviceComplianceOrg&lt;/STRONG&gt;, and &lt;STRONG&gt;IntuneDevices &lt;/STRONG&gt;in the list.&lt;/P&gt;
&lt;img /&gt;&lt;EM&gt;Microsoft Sentinel in Defender Portal – Tables&lt;/EM&gt;&lt;/td&gt;&lt;td style="height: 603.734px;"&gt;
&lt;P&gt;&lt;STRONG&gt;1. Navigate to&amp;nbsp;&lt;EM&gt;Logs&lt;/EM&gt;:&lt;/STRONG&gt; Sign in to the &lt;A href="https://portal.azure.com" target="_blank" rel="noopener"&gt;https://portal.azure.com&lt;/A&gt; and open &lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt;. Select your Sentinel workspace, then click &lt;STRONG&gt;Logs&lt;/STRONG&gt; (under &lt;STRONG&gt;General&lt;/STRONG&gt;).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;2. Find Intune Tables:&lt;/STRONG&gt; In the Logs &lt;STRONG&gt;query editor&lt;/STRONG&gt; that opens, you’ll see a &lt;STRONG&gt;Schema&lt;/STRONG&gt; or tables list on the left. If it’s collapsed, click &lt;STRONG&gt;&amp;gt;&amp;gt;&lt;/STRONG&gt; to expand it. Scroll down to find &lt;STRONG&gt;LogManagement&lt;/STRONG&gt; and &lt;STRONG&gt;expand&lt;/STRONG&gt; it; look for these Intune-related tables: &lt;STRONG&gt;IntuneAuditLogs&lt;/STRONG&gt;, &lt;STRONG&gt;IntuneOperationalLogs&lt;/STRONG&gt;, &lt;STRONG&gt;IntuneDeviceComplianceOrg&lt;/STRONG&gt;, and &lt;STRONG&gt;IntuneDevices&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;&lt;EM&gt;Microsoft Sentinel in Azure Portal – Tables&lt;/EM&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt; &lt;/EM&gt;&lt;STRONG&gt;Querying Intune Log Tables in Sentinel&lt;/STRONG&gt; – &lt;EM&gt;Once the tables are present, use Kusto Query Language (KQL) in either portal to view and analyze Intune data:&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="width: 96.8269%; height: 918.766px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft 365 Defender Portal (Unified)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Portal (Microsoft Sentinel)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 879.766px;"&gt;&lt;td style="height: 879.766px;"&gt;
&lt;P&gt;In the&amp;nbsp;&lt;STRONG&gt;Advanced Hunting&lt;/STRONG&gt; page, ensure the query editor is visible (select &lt;STRONG&gt;New query&lt;/STRONG&gt; if needed). Run a simple KQL query such as:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;IntuneDevice
| take 5&lt;/LI-CODE&gt;
&lt;P&gt;Click&amp;nbsp;&lt;STRONG&gt;Run query&lt;/STRONG&gt; to display sample Intune device records. If results are returned, it confirms that Intune data is being ingested successfully. Note that querying across Microsoft Sentinel data in the unified Advanced Hunting view requires at least the &lt;STRONG&gt;Microsoft Sentinel Reader&lt;/STRONG&gt; role.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Microsoft Sentinel in the Microsoft Defender Portal - Advanced hunting query.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 879.766px;"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the&amp;nbsp;&lt;STRONG&gt;Azure Logs&lt;/STRONG&gt; blade, use the query editor to run a simple KQL query such as:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;IntuneDevice
| take 5&lt;/LI-CODE&gt;
&lt;P&gt;Select&amp;nbsp;&lt;STRONG&gt;Run&lt;/STRONG&gt; to view the results in a table showing sample Intune device data. If results appear, it confirms that your Intune logs are being collected successfully. You can select any record to view full event details and use KQL to further explore or filter the data - for example, by querying IntuneDeviceComplianceOrg to identify devices that are not compliant and adjust the query as needed.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Microsoft Sentinel in the Azure Portal - Sentinel logs query.&lt;/EM&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Once Microsoft Intune logs are flowing into Microsoft Sentinel, the real value comes from transforming that raw device and audit data into actionable security signals.&amp;nbsp;&lt;/STRONG&gt;
&lt;P&gt;To achieve this, you should set up detection rules that continuously analyze the Intune logs and automatically flag any risky or suspicious behavior. In practice, this means creating &lt;STRONG&gt;custom detection rules&lt;/STRONG&gt; in the Microsoft Defender portal (part of the unified XDR experience) see [&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules&lt;/A&gt;] and &lt;STRONG&gt;scheduled analytics rules&lt;/STRONG&gt; in Microsoft Sentinel (in either the Azure Portal or the unified Defender portal interface) see:[&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/create-analytics-rules?tabs=azure-portal" target="_blank" rel="noopener"&gt;Create scheduled analytics rules in Microsoft Sentinel | Microsoft Learn]&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;These detection rules will continuously monitor your Intune telemetry – &lt;STRONG&gt;tracking device compliance status, enrollment activity, and administrative actions&lt;/STRONG&gt; – and will &lt;STRONG&gt;raise alerts whenever they detect suspicious or out-of-policy events&lt;/STRONG&gt;. For example, you can be alerted if a large number of devices fall out of compliance, if an unusual spike in enrollment failures occurs, or if an Intune policy is modified by an unexpected account. Each alert generated by these rules becomes an incident in Microsoft Sentinel (and in the XDR Defender portal’s unified incident queue), enabling your security team to investigate and respond through the standard SOC workflow. In turn, this &lt;STRONG&gt;converts raw Intune log data into high-value security insights&lt;/STRONG&gt;: you’ll achieve proactive detection of potential issues, faster investigation by pivoting on the enriched Intune data in each incident, and even automated response across your endpoints (for instance, by triggering &lt;STRONG&gt;playbooks&lt;/STRONG&gt; or other &lt;STRONG&gt;automated remediation&lt;/STRONG&gt; actions when an alert fires).&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Use this Detection Logic to Create a detection Rule&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;IntuneDeviceComplianceOrg
| where TimeGenerated &amp;gt; ago(24h)
| where ComplianceState != "Compliant"
| summarize NonCompliantCount = count() by DeviceName, TimeGenerated
| where NonCompliantCount &amp;gt; 3&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Additional Tips:&lt;/STRONG&gt; After confirming data ingestion and setting up alerts, you can &lt;STRONG&gt;leverage other Microsoft Sentinel features&lt;/STRONG&gt; to get more value from your Intune logs. For example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Workbooks for Visualization:&lt;/STRONG&gt; Create custom &lt;STRONG&gt;workbooks&lt;/STRONG&gt; to build dashboards for Intune data (or check if community-contributed Intune workbooks are available). This can help you monitor device compliance trends and Intune activities visually.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Hunting and Queries:&lt;/STRONG&gt; Use &lt;STRONG&gt;advanced hunting&lt;/STRONG&gt; (KQL queries) to proactively search through Intune logs for suspicious activities or trends. The unified Defender portal’s Advanced Hunting page can query both Sentinel (Intune logs) and Defender data together, enabling &lt;STRONG&gt;correlation across Intune and other security data&lt;/STRONG&gt;. For instance, you might join IntuneDevices data with Azure AD sign-in logs to investigate a device associated with risky sign-ins.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Incident Management:&lt;/STRONG&gt; Leverage Sentinel’s &lt;STRONG&gt;Incidents&lt;/STRONG&gt; view (in Azure portal) or the unified &lt;STRONG&gt;Incidents&lt;/STRONG&gt; queue in Defender to investigate alerts triggered by your new rules. Incidents in Sentinel (whether created in Azure or Defender portal) will appear in the connected portal, allowing your security operations team to manage Intune-related alerts just like any other security incident.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Built-in Rules &amp;amp; Content:&lt;/STRONG&gt; Remember that Microsoft Sentinel provides many built-in &lt;STRONG&gt;Analytics Rule templates&lt;/STRONG&gt; and &lt;STRONG&gt;Content Hub&lt;/STRONG&gt; solutions. While there isn’t a native pre-built Intune content pack as of now, you can use general Sentinel features to monitor Intune data.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Frequently Asked Questions&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;If you’ve set everything up but don’t see logs in Sentinel, run through these checks:
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Check Diagnostic Settings&lt;/STRONG&gt;
&lt;OL&gt;
&lt;LI&gt;Go to the Microsoft Intune admin center → Reports → Diagnostic settings.&lt;/LI&gt;
&lt;LI&gt;Make sure the setting is turned ON and sending the right log categories to the correct Microsoft Sentinel workspace.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Confirm the Right Workspace&lt;/STRONG&gt;
&lt;OL&gt;
&lt;LI&gt;Double-check that the Azure subscription and Microsoft Sentinel workspace are selected.&lt;/LI&gt;
&lt;LI&gt;If you have multiple tenants/directories, make sure you’re in the right one.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Verify Permissions&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Make Sure Logs Are Being Generated&lt;/STRONG&gt;
&lt;OL&gt;
&lt;LI&gt;If no devices are enrolled or no actions have been taken, there may be nothing to log yet.&lt;/LI&gt;
&lt;LI&gt;Try enrolling a device or changing a policy to trigger logs.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Check Your Queries&lt;/STRONG&gt;
&lt;OL&gt;
&lt;LI&gt;Make sure you’re querying the correct workspace and time range in Microsoft Sentinel.&lt;/LI&gt;
&lt;LI&gt;Try a direct query like:&lt;BR /&gt;&lt;LI-CODE lang="json"&gt;IntuneAuditLogs | take 5&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Still Nothing?&lt;/STRONG&gt;
&lt;OL&gt;
&lt;LI&gt;Try deleting and re-adding the diagnostic setting.&lt;/LI&gt;
&lt;LI&gt;Most issues come down to permissions or selecting the wrong workspace.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;How long are Intune logs retained, and how can I keep them longer?&lt;BR /&gt;
&lt;OL&gt;
&lt;LI&gt;The &lt;STRONG&gt;analytics tier&lt;/STRONG&gt; keeps data in the &lt;STRONG&gt;interactive retention&lt;/STRONG&gt; state for &lt;STRONG&gt;90 days&lt;/STRONG&gt; by default, extensible for up to two years. This interactive state, while expensive, allows you to query your data in unlimited fashion, with high performance, at no charge per query:&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/sentinel/log-plans#analytics-tier" target="_blank" rel="noopener"&gt;Log retention tiers in Microsoft Sentinel&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;We hope this helps you to successfully connect your resources and end-to-end ingest Intune logs into Microsoft Sentinel. If you have any questions, leave a comment below or reach out to us on X &lt;A class="lia-external-url" href="https://aka.ms/MSFTSecSuppTeam" target="_blank" rel="noopener"&gt;@MSFTSecSuppTeam&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/how-to-ingest-microsoft-intune-logs-into-microsoft-sentinel/ba-p/4508562</guid>
      <dc:creator>PaulineMbabu</dc:creator>
      <dc:date>2026-04-10T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Estimate Microsoft Sentinel Costs with Confidence Using the New Sentinel Cost Estimator</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/estimate-microsoft-sentinel-costs-with-confidence-using-the-new/ba-p/4507062</link>
      <description>&lt;P&gt;One of the first questions teams ask when evaluating Microsoft Sentinel is simple: what will this actually cost? Today, many customers and partners estimate Sentinel costs using the Azure Pricing Calculator, but it doesn’t provide the Sentinel-specific usage guidance needed to understand how each Sentinel meter contributes to overall spend. As a result, it can be hard to produce accurate, trustworthy estimates, especially early on, when you may not know every input upfront. To make these conversations easier and budgets more predictable, Microsoft is introducing the new Sentinel Cost Estimator (public preview) for Microsoft customers and partners.&lt;/P&gt;
&lt;P&gt;The Sentinel Cost Estimator gives organizations better visibility into spend and more confidence in budgeting as they operate at scale.&lt;/P&gt;
&lt;P&gt;You can access the Microsoft Sentinel Cost Estimator here: &lt;A href="https://microsoft.com/en-us/security/pricing/microsoft-sentinel/cost-estimator" target="_blank" rel="noopener"&gt;https://microsoft.com/en-us/security/pricing/microsoft-sentinel/cost-estimator&lt;/A&gt;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;What the Sentinel Cost Estimator does &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The new Sentinel Cost Estimator makes pricing transparent and predictable for Microsoft customers and partners.&amp;nbsp;&amp;nbsp;The Sentinel Cost Estimator helps you understand what drives costs at a meter level and ensures your estimates are accurate with step-by-step guidance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can model multi-year estimates with built-in projections for up to three years, making it easy to anticipate data growth, plan for future spend, and avoid budget surprises as your security operations mature. Estimates can be easily shared with finance and security teams to support better budgeting and planning.&lt;/P&gt;
&lt;H2&gt;When to Use the Sentinel Cost Estimator&lt;/H2&gt;
&lt;P&gt;Use the Sentinel Cost Estimator to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Model ingestion growth over time as new data sources are onboarded&lt;/LI&gt;
&lt;LI&gt;Explore tradeoffs between Analytics and Data Lake storage tiers&lt;/LI&gt;
&lt;LI&gt;Understand the impact of retention requirements on total spend&lt;/LI&gt;
&lt;LI&gt;Estimate compute usage for notebooks and advanced queries&lt;/LI&gt;
&lt;LI&gt;Project costs across a multi‑year deployment timeline&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For broader Azure infrastructure cost planning, the Azure Pricing Calculator can still be used alongside the Sentinel Cost Estimator.&lt;/P&gt;
&lt;H2&gt;Cost Estimator Example&lt;/H2&gt;
&lt;P&gt;Let’s walk through a practical example using the Cost Estimator. A medium-sized company that is new to Microsoft Sentinel wants a high-level estimate of expected costs. In their previous SIEM, they performed proactive threat hunting across identity, endpoint, and network logs; ran detections on high-security-value data sources from multiple vendors; built a small set of dashboards; and required three years of retention for compliance and audit purposes. Based on their prior SIEM, they estimate they currently ingest about 2 TB per day.&lt;/P&gt;
&lt;P&gt;In the Cost Estimator, they select their region and enter their daily ingestion volume. As they are not currently using Sentinel data lake, they can explore different ways of splitting ingestion between tiers to understand the potential cost benefit of using the data lake.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Their retention requirement is three years. If they choose to use Sentinel data lake, they can plan to retain 90 days in the Analytics tier (included with Microsoft Sentinel) and keep the remaining data in Sentinel data lake for the full three years.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;As notebooks are new to them, they plan to evaluate notebooks for SOC workflows and graph building. They expect to start in the light usage tier and may move to medium as they mature. Since they occasionally query data older than 90 days to build trends—and anticipate using the Sentinel MCP server for SOC workflows on Sentinel lake data—they expect to start in the medium query volume tier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; These tiers are for estimation purposes only; they do not lock in pricing when using the Microsoft Sentinel platform.&lt;/P&gt;
&lt;P&gt;Because this customer is upgrading from Microsoft 365 E3 to E5, they may be eligible for free ingestion based on their user count. Combined with their eligible server data from Defender for Servers, this can reduce their billable ingestion.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;In the review step, the Cost Estimator projects costs across a three-year window and breaks down drivers such as data tiers, commitment tiers, and comparisons with alternative storage options. From there, the customer can go back to earlier steps to adjust inputs and explore different scenarios. Once done, the estimate report can be exported for reference with Microsoft representatives and internal leadership when discussing the deployment of Microsoft Sentinel and Sentinel Platform.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;Finalize Your Estimate with Microsoft&lt;/H2&gt;
&lt;P&gt;The Microsoft Sentinel Cost Estimator is designed to provide directional guidance and help organizations understand how architectural decisions may influence cost. Final pricing may vary based on factors such as deployment architecture, commitment tiers, and applicable discounts. We recommend working with your Microsoft account team or a Security sales specialist to develop a formal proposal tailored to your organization’s requirements.&lt;/P&gt;
&lt;H2&gt;Try the Microsoft Sentinel Cost Estimator&lt;/H2&gt;
&lt;P&gt;Start building your Microsoft Sentinel cost estimate today: &lt;A href="https://microsoft.com/en-us/security/pricing/microsoft-sentinel/cost-estimator" target="_blank" rel="noopener"&gt;https://microsoft.com/en-us/security/pricing/microsoft-sentinel/cost-estimator&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 22:26:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/estimate-microsoft-sentinel-costs-with-confidence-using-the-new/ba-p/4507062</guid>
      <dc:creator>shubh_khandhadia</dc:creator>
      <dc:date>2026-04-09T22:26:18Z</dc:date>
    </item>
    <item>
      <title>Introducing the New Microsoft Sentinel Logstash Output Plugin (Public Preview!)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-the-new-microsoft-sentinel-logstash-output-plugin/ba-p/4508904</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Many organizations rely on Logstash as a flexible, trusted data pipeline for collecting, transforming, and forwarding logs from on-premises and hybrid environments. Microsoft Sentinel has long supported a Logstash output plugin, enabling customers to send data directly into Sentinel as part of their existing pipelines. The original plugin was implemented in Ruby, and while it has served its purpose, it no longer meets Microsoft’s Secure Future Initiative (SFI) standards and has limited engineering support. To address both security and sustainability, we have &lt;A class="lia-external-url" href="https://rubygems.org/gems/microsoft-sentinel-log-analytics-logstash-output-plugin/versions/2.0.0-java" target="_blank"&gt;rebuilt the plugin&lt;/A&gt; from the ground up in Java, a language that is more secure, better supported across Microsoft, and aligned with long-term platform investments.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To ensure a seamless transition, the new implementation is still packaged and distributed as a standard Logstash Ruby gem. This means the installation and usage experience remains unchanged for customers, while benefiting from a more secure and maintainable foundation.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;What's New in This Version&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Java&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;based&amp;nbsp;and SFI&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;compliant&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Same Logstash plugin experience, now rebuilt on a stronger foundation. The new implementation is fully Java&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;based, aligning with Microsoft’s Secure Future Initiative (SFI) and providing improved security, supportability, and&amp;nbsp;long-term&amp;nbsp;maintainability.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Modern,&amp;nbsp;DCR&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;based&amp;nbsp;ingestion&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;The plugin now uses the Azure Monitor&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Logs Ingestion API&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;with&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Data Collection Rules (DCRs)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, replacing the legacy HTTP Data Collection API (For more info,&amp;nbsp;see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/logs/custom-logs-migrate" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Migrate from the HTTP Data Collector API to the Log Ingestion API - Azure Monitor | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;). This gives customers full schema control, enables custom log tables, and supports ingestion into standard Microsoft Sentinel tables as well as Microsoft Sentinel data lake.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Flexible authentication options&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Authentication is automatically&amp;nbsp;determined&amp;nbsp;based on your configuration, with support for:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Client secret&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(App registration / service principal)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Managed identity&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;eliminating&amp;nbsp;the need to store credentials in configuration files&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559683&amp;quot;:0,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Sovereign cloud support:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The plugin supports Azure sovereign clouds, including&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Azure US Government&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Azure China&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Azure Germany&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Standard Logstash distribution model&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;The plugin is published on&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;RubyGems.org&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, the standard distribution channel for Logstash plugins, and can be installed directly using the Logstash plugin manager, no change to your existing installation workflow.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;What the Plugin Does&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Logstash&amp;nbsp;plugin&amp;nbsp;operates&amp;nbsp;as a three-stage&amp;nbsp;data&amp;nbsp;pipeline:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Input → Filter → Output.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Input&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;You control how data enters the pipeline,&amp;nbsp;using&amp;nbsp;sources such as&amp;nbsp;syslog,&amp;nbsp;filebeat, Kafka, Event Hubs, databases (via JDBC), files, and more.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Filter&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;You enrich and transform events using Logstash’s powerful filtering ecosystem, including plugins like&amp;nbsp;grok,&amp;nbsp;mutate, and&amp;nbsp;Json, shaping data to match your security and operational needs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Output&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This is where&amp;nbsp;Microsoft comes in.&amp;nbsp;The Microsoft Sentinel Logstash Output Plugin securely sends your processed events to an Azure Monitor Data Collection Endpoint, where they are ingested into Sentinel via a Data Collection Rule (DCR).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300,&amp;quot;335559991&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300,&amp;quot;335559991&amp;quot;:360}"&gt;&lt;SPAN data-contrast="auto"&gt;With this model, you&amp;nbsp;retain&amp;nbsp;full control over your Logstash pipeline and data processing logic, while the Sentinel plugin provides a secure, reliable path to ingest data into Microsoft Sentinel.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300,&amp;quot;335559991&amp;quot;:360}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:0}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Getting Started&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Prerequisites&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Logstash installed and running&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;An Azure Monitor Data Collection Endpoint (DCE) and Data Collection Rule (DCR) in your subscription&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Contributor role&amp;nbsp;on your Log Analytics workspace&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Who Is This For?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Organizations that already have Logstash pipelines, need to collect from on-premises or legacy systems,&amp;nbsp;and&amp;nbsp;operate&amp;nbsp;in distributed/hybrid environments including air-gapped networks.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;To learn&amp;nbsp;more,&amp;nbsp;see&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://rubygems.org/gems/microsoft-sentinel-log-analytics-logstash-output-plugin/versions/2.0.0-java" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;microsoft-sentinel-log-analytics-logstash-output-plugin | RubyGems.org | your community gem host&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2026 22:28:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-the-new-microsoft-sentinel-logstash-output-plugin/ba-p/4508904</guid>
      <dc:creator>JamesAde</dc:creator>
      <dc:date>2026-04-06T22:28:06Z</dc:date>
    </item>
    <item>
      <title>Accelerate Agent Development: Hacks for Building with Microsoft Sentinel data lake</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/accelerate-agent-development-hacks-for-building-with-microsoft/ba-p/4503039</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As a Senior Product Manager | Developer Architect&amp;nbsp;on the App Assure team&amp;nbsp;working&amp;nbsp;to bring&amp;nbsp;Microsoft Sentinel&amp;nbsp;and Security Copilot&amp;nbsp;solutions to market, I&amp;nbsp;interact with&amp;nbsp;many&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ISVs building&amp;nbsp;agents&amp;nbsp;on Microsoft Sentinel data lake for the first time.&amp;nbsp;I’ve&amp;nbsp;written&amp;nbsp;this article&amp;nbsp;to walk&amp;nbsp;you through one&amp;nbsp;possible approach&amp;nbsp;for agent development&amp;nbsp;– the&amp;nbsp;process&amp;nbsp;I use when building sample agents internally at Microsoft.&amp;nbsp;If you have questions about this, or other methods for building your agent, App Assure offers guidance through&amp;nbsp;our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/SentinelAdvisoryService" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Sentinel Advisory Service&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Throughout this post, I include screenshots and examples from&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://securitystore.microsoft.com/solutions/gigamon-inc.gigamon-security-posture-agent" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Gigamon’s Security Posture Insight Agent&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This&amp;nbsp;article&amp;nbsp;assumes&amp;nbsp;you have:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;An existing SaaS or security product with accessible telemetry.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;A small ISV team (2–3 engineers + 1 PM).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Focus on a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;single high value scenario&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for the first&amp;nbsp;agent.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The Composite Application Model (What You Are Building)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;When I begin designing an agent, I think end-to-end, from data ingestion requirements through agentic logic, following the Composite application model.&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The Composite Application Model consists of five layers:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Data&amp;nbsp;Sources&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Your product’s raw security, audit, or operational&amp;nbsp;data.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Ingestion&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Getting that&amp;nbsp;data&amp;nbsp;into Microsoft Sentinel.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Sentinel data lake &amp;amp; Microsoft Graph&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Normalization, storage, and correlation.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Agent&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Reasoning logic that queries&amp;nbsp;data&amp;nbsp;and produces outcomes.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;End User&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Security Copilot or SaaS experiences that invoke the agent.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This separation&amp;nbsp;allows for&amp;nbsp;evolving&amp;nbsp;data&amp;nbsp;ingestion and agent logic&amp;nbsp;simultaneously. It&amp;nbsp;also&amp;nbsp;helps avoid downstream surprises that require going back and&amp;nbsp;rearchitecting the entire solution.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Optional Prerequisite&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;You are enrolled in the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/software-development-companies/offers-benefits/isv-success?msockid=0bcbf8c731f8678d2260ebd5304266ea" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ISV Success Program&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;so you can earn Azure Credits to provision Security Compute Units (SCUs) for Security Copilot Agents.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Phase 1:&amp;nbsp;Data&amp;nbsp;Ingestion Design &amp;amp; Implementation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Choose Your Ingestion Strategy&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;SPAN data-contrast="auto"&gt;The first&amp;nbsp;choice I face when designing an agent is how&amp;nbsp;the&amp;nbsp;data is going to flow into my&amp;nbsp;Sentinel workspace.&amp;nbsp;Below I document&amp;nbsp;two primary&amp;nbsp;methods for ingestion.&lt;/SPAN&gt; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Option&amp;nbsp;A: Codeless Connector Framework (CCF)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;This is the best&amp;nbsp;option&amp;nbsp;for ISVs with REST APIs. To build a CCF solution, reference&amp;nbsp;our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/create-codeless-connector" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;documentation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for getting started.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Option B: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/public-preview-announcement-empower-real-time-security-with-microsoft-sentinel%E2%80%99s/4483884" target="_blank" rel="noopener" data-lia-auto-title="CCF Push (Public Preview)" data-lia-auto-title-active="0"&gt;CCF Push (Public Preview)&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;In this instance, an&amp;nbsp;ISV pushes events directly to Sentinel&amp;nbsp;via a CCF Push connector.&amp;nbsp;Our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/create-push-codeless-connector" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;MS Learn documentation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is&amp;nbsp;a great place&amp;nbsp;to get started using this method.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Additional Note:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;In the event you find that CCF does not support your needs, &lt;A href="https://aka.ms/AppAssure" target="_blank" rel="noopener"&gt;reach out to App Assure&lt;/A&gt; so we can capture your requirements for future consideration. Azure Functions remains an option if you’ve documented your CCF feature needs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Phase 2: Onboard to Microsoft Sentinel data lake&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Once&amp;nbsp;my&amp;nbsp;data&amp;nbsp;is flowing into Sentinel,&amp;nbsp;I&amp;nbsp;onboard a single Sentinel workspace to&amp;nbsp;data&amp;nbsp;lake.&amp;nbsp;This is a one-time action and cannot be repeated for additional workspaces.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Onboarding Steps&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Go to the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Defender portal&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Follow the Sentinel&amp;nbsp;Data&amp;nbsp;lake&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs/blob/main/01-Sentinel-DataLake-Onboarding.md" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;onboarding instructions&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Validate that tables are visible in the lake.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;See&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/kql-queries" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;R&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;unning KQL Queries in&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;d&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ata&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;lake&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for&amp;nbsp;additional&amp;nbsp;information.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Phase 3: Build and Test the Agent in Microsoft Foundry&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Once my data is successfully ingested into data lake, I begin the agent development process. There are multiple ways to build agents depending on your needs and tooling preferences. For this example, I chose Microsoft Foundry because it fit my needs for real-time logging, cost efficiency, and greater control.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;1. Create a Microsoft Foundry Instance&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Foundry is used as a tool&amp;nbsp;for&amp;nbsp;your&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;development environment.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Reference our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs/blob/main/04-Building-an-Agent-in-Azure-AI-Foundry.md#step-2%EF%B8%8F%E2%83%A3--create-the-agent-in-ai-foundry" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;QuickStart guid&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for&amp;nbsp;setting up&amp;nbsp;your&amp;nbsp;Foundry instance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Required Permissions:&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Security Reader (Entra or Subscription)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Azure AI Developer at the resource group&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;After setup, click&amp;nbsp;&lt;STRONG&gt;Create Agent&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;2.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Design the Agent&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;U&gt;A strong first agent:&lt;/U&gt;&lt;/SPAN&gt;&lt;U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Solves one narrow security problem.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Has deterministic outputs.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Uses explicit instructions, not vague prompts.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;U&gt;Example agent responsibilities:&lt;/U&gt;&lt;/SPAN&gt;&lt;U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;To query Sentinel data lake (Sentinel data exploration tool).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;To summarize recent incidents.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;To correlate ISVs specific signals with Sentinel alerts and other ISV tables (Sentinel data exploration tool).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;3. Implement Agent Instructions&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;U&gt;Well-designed agent instructions should include:&lt;/U&gt;&lt;/SPAN&gt;&lt;U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Role definition ("You are a security investigation agent…").&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Data sources it can access.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Step by step reasoning rules.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Output format expectations.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;SPAN data-contrast="auto"&gt;Sample Instructions can be found&amp;nbsp;here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs/blob/main/04-Building-an-Agent-in-Azure-AI-Foundry.md#identitydrift-agent-instructions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Agent Instructions&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;4. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Configure the Microsoft Model Context Protocol (MCP) tooling for your agent&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For your agent to query, summarize and correlate all the data your connector has sent to data lake, take the following steps:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Select &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Tools&lt;/STRONG&gt;, &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and under Catalog, type Sentinel, and then select &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Microsoft Sentinel&amp;nbsp;Data&amp;nbsp;Exploration&lt;/STRONG&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;For more information about the data exploration tool collection in MCP server,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-data-exploration-tool" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;see our documentation.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;I always test repeatedly with real data until outputs are consistent. For more information on testing and validating the agent, please reference &lt;/SPAN&gt;&lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs/blob/main/04-Building-an-Agent-in-Azure-AI-Foundry.md#step-3%EF%B8%8F%E2%83%A3-test-ai-agent" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;our documentation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Phase 4: Migrate the Agent to Security Copilot&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Once the agent works in Foundry,&amp;nbsp;I&amp;nbsp;migrate it to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Security Copilot&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. To do this:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Copy the full instruction set from Foundry&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Provision a SCU for your Security Copilot workspace. For instructions, please reference &lt;/SPAN&gt;&lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs/blob/main/05-Building-an-Agent-in-Security-Copilot.md#step-1%EF%B8%8F%E2%83%A3--create-a-security-copilot-workspace" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;this documentation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Make note of this process as you will be charged per hour per SCU&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Once&amp;nbsp;you&amp;nbsp;are done testing you will need to deprovision the capacity to prevent&amp;nbsp;additional&amp;nbsp;charges&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Open Security Copilot and u&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;se &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Create&amp;nbsp;From&amp;nbsp;Scratch Agent Builder&lt;/STRONG&gt;&amp;nbsp;as&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs/blob/main/05-Building-an-Agent-in-Security-Copilot.md#navigate-to-agent-creation" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;outlined here.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Add Sentinel data exploration MCP tools (these are the same instructions from the Foundry agent in the previous step).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;For more information on linking the Sentinel MCP tools,&amp;nbsp;please refer to&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs/blob/main/05-Building-an-Agent-in-Security-Copilot.md#step-4-add-tools" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;this article&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Paste and adapt instructions.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At this stage,&amp;nbsp;I always&amp;nbsp;validate&amp;nbsp;the following:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Agent Permissions&lt;/STRONG&gt; – I have confirmed the agent has the necessary permissions to interact with the MCP tool and read data from your data lake instance. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Agent&amp;nbsp;Performance&lt;/STRONG&gt; – I have confirmed a s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;uccessful interaction with measured latency and benchmark results.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This step intentionally avoids reimplementation. I am reusing proven logic.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Phase 5: Execute,&amp;nbsp;Validate, and Publish&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;After setting up my agent, I navigate to the &lt;STRONG&gt;Agents&lt;/STRONG&gt; tab to manually trigger the agent. For more information on testing an agent you can refer to &lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs/blob/main/05-Building-an-Agent-in-Security-Copilot.md#step-3%EF%B8%8F%E2%83%A3--set-up-the-identitydrift-investigation-agent" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;this article&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Now that the agent has been executed successfully, I download the agent Manifest file from the environment so that it can be packaged.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Click &lt;STRONG&gt;View code&lt;/STRONG&gt; on the Agent under the Build tab as outlined &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/developer/create-agent-dev#view-code" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;in th&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;is&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;documentation&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Publishing to the Microsoft Security Store&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;SPAN data-contrast="auto"&gt;If I were publishing my agent to the&amp;nbsp;Microsoft Security Store, these&amp;nbsp;are the&amp;nbsp;steps&amp;nbsp;I would follow:&lt;/SPAN&gt; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Finalize ingestion reliability.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Document required permissions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Define supported scenarios clearly.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Package agent instructions and guidance (by&lt;/SPAN&gt;&amp;nbsp;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/en-us/security/store/publish-a-security-copilot-agent-or-analytics-solution-in-security-store" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;following these instructions&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;)&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Summary&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Based on my experience developing Security Copilot agents on Microsoft Sentinel data lake,&amp;nbsp;this&amp;nbsp;playbook provides a practical, repeatable framework for ISVs to accelerate their agent development and delivery while&amp;nbsp;maintaining&amp;nbsp;high standards&amp;nbsp;of quality.&amp;nbsp;This foundation enables rapid iteration—future agents can often be built in days, not weeks, by reusing the same ingestion and data lake setup.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When starting on your own agent development journey, keep&amp;nbsp;the following in mind:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;To limit initial&amp;nbsp;scope.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;To reuse Microsoft managed&amp;nbsp;infrastructure.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;To separate ingestion from intelligence.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What Success Looks Like&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At the end of this development process, you will have the following:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;A Microsoft Sentinel data connector&amp;nbsp;live&amp;nbsp;in Content Hub (or in process) that provides a&amp;nbsp;data ingestion&amp;nbsp;path. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Data visible&amp;nbsp;in data lake. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;A tested agent running&amp;nbsp;in&amp;nbsp;Security Copilot.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Clear documentation for customers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A key success factor&amp;nbsp;I look&amp;nbsp;for is clarity over completeness.&amp;nbsp;A focused agent is far more likely to be adopted.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Need help?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you have any issues as you work to develop your agent, please&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/AppAssure" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;reach out to the App Assure team&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for support via&amp;nbsp;our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/SentinelAdvisoryService" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Sentinel Advisory Service&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;.&amp;nbsp;Or if you have any other tips, please comment below,&amp;nbsp;I’d&amp;nbsp;love to hear your feedback.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 21:37:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/accelerate-agent-development-hacks-for-building-with-microsoft/ba-p/4503039</guid>
      <dc:creator>MitchellGulledge</dc:creator>
      <dc:date>2026-04-02T21:37:47Z</dc:date>
    </item>
    <item>
      <title>Microsoft Sentinel MCP Server with external AI models (Claude) for natural language investigations</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-mcp-server-with-external-ai-models-claude-for/ba-p/4507013</link>
      <description>&lt;P&gt;Security teams are increasingly exploring how AI assistants support them in investigating incidents, asking questions, and exploring their data. At the same time, controlling how data is accessed remains critical. Today, we’re sharing how Sentinel can support a third-party AI assistant like Claude through a new integration approach using&amp;nbsp;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/microsoft-sentinel-mcp-server---generally-available-with-exciting-new-capabiliti/4470125" target="_blank" rel="noopener" data-lia-auto-title="Sentinel’s Model Context Protocol (MCP) server," data-lia-auto-title-active="0"&gt;Sentinel’s Model Context Protocol (MCP) server,&lt;/A&gt; while continuing to rely on &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id" target="_blank" rel="noopener"&gt;Microsoft Entra ID&lt;/A&gt; for enterprise grade authentication and access control. This approach uses Microsoft Sentinel with Entra ID to let third-party AI tools access Sentinel data.&lt;/P&gt;
&lt;H4&gt;Why this matters&lt;/H4&gt;
&lt;P&gt;Sentinel customers can explore security data using natural language to assist investigations, while preserving strict tenant isolation and access controls, without managing app registrations or shared secrets. AI third-party assistants like Claude can access Sentinel through Microsoft’s existing security infrastructure. When a query is made, the assistant calls the Sentinel MCP server, which enforces authentication via Entra ID before returning data. This Claude third-party connector is now available.&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-chatgpt-claude-connector" target="_blank" rel="noopener"&gt;Click here for detailed guidance&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Resources&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Use the Microsoft Sentinel MCP connector in ChatGPT or Claude Code&lt;/STRONG&gt;&lt;BR /&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-chatgpt-claude-connector" target="_blank" rel="noopener"&gt;Use the Microsoft Sentinel MCP connector in ChatGPT or Claude&amp;nbsp;- Microsoft Security | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel MCP overview&lt;/STRONG&gt;&lt;BR /&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-tools-overview" target="_blank" rel="noopener"&gt;What is Microsoft Sentinel MCP server's tool collection? - Microsoft Security | Microsoft Learn&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Get started with Sentinel MCP&lt;/STRONG&gt;&lt;BR /&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-get-started" target="_blank" rel="noopener"&gt;Get started with Microsoft Sentinel MCP server - Microsoft Security | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 21:35:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-mcp-server-with-external-ai-models-claude-for/ba-p/4507013</guid>
      <dc:creator>mcasgrain</dc:creator>
      <dc:date>2026-04-22T21:35:29Z</dc:date>
    </item>
    <item>
      <title>How Granular Delegated Admin Privileges (GDAP) allows Sentinel customers to delegate access</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/how-granular-delegated-admin-privileges-gdap-allows-sentinel/ba-p/4503123</link>
      <description>&lt;H4&gt;&lt;STRONG&gt;Simplifying Defender SIEM and XDR delegated access&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;As Microsoft Sentinel and Defender converge into a unified experience, organizations face a fundamental challenge: the lack of a scalable, comprehensive, delegated access model that works seamlessly across Entra ID and Sentinel’s Azure Resource Manage creating a significant barrier for Managed Security Service Providers (MSSPs) and large enterprises with complex multi-tenant structures.&lt;/P&gt;
&lt;H4&gt;Extending GDAP beyond CSPs: a strategic solution&lt;/H4&gt;
&lt;P&gt;In response to these challenges, we have developed an extension to GDAP that makes it available to all Sentinel and Defender customers, including non-CSP organizations. This expansion enables both MSSPs and customers with multi-tenant organizational structures to establish secure, granular delegated access relationships directly through the Microsoft Defender portal. This is now available in public preview.&lt;/P&gt;
&lt;P&gt;The GDAP extension aligns with zero-trust security principles through a three-way handshake model requiring explicit mutual consent between governing and governed tenants before any relationship is established. This consent-based approach enhances transparency and accountability, reducing risks associated with broad, uncontrolled permissions. By integrating with Microsoft Defender, GDAP enables advanced threat detection and response capabilities across tenant boundaries while maintaining granular permission management through Entra ID roles and Unified RBAC custom permissions.&lt;/P&gt;
&lt;H4&gt;Delivering unified management of delegated access across SIEM and XDR&lt;/H4&gt;
&lt;P&gt;With GDAP, customers gain a truly unified way to manage access across both Microsoft Sentinel and Defender—using a single, consistent delegated access model for SIEM and XDR. For Sentinel customers, this brings parity with the Azure portal experience: where delegated access was previously managed through Azure Lighthouse, it can now be handled directly in the Defender portal using GDAP. More importantly, for organizations running SIEM and XDR together, GDAP eliminates the need to switch between portals—allowing teams to view, manage, and govern security access from one centralized experience. The result is simpler administration, reduced operational friction, and a more cohesive way to secure multi-tenant environments at scale.&lt;/P&gt;
&lt;H4&gt;How GDAP for non-CSPs works: the three-step handshake&lt;/H4&gt;
&lt;P&gt;The GDAP handshake model implements a security-first approach through three distinct steps, each requiring explicit approval to prevent unauthorized access. &lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Step 1&lt;/STRONG&gt; begins with the governed tenant initiating the relationship, allowing the governing tenant to request GDAP access.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2&lt;/STRONG&gt; shifts control to the governing tenant, which creates and sends a delegated access request with specific requested permissions through the multi-tenant organization (MTO) portal.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3&lt;/STRONG&gt; returns to the governed tenant for final approval.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;The approach provides customers with complete visibility and control over who can access their security data and with what permissions, while giving MSSPs a streamlined, Microsoft-supported mechanism for managing delegated relationships at scale.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4&lt;/STRONG&gt; assigns Sentinel permissions.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;In Azure resource management, assign governing tenant’s groups with Sentinel workspaces permissions (in the governed tenant), selecting the governing tenant’s security groups used in the created relationship.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more here: &lt;A href="https://learn.microsoft.com/en-us/unified-secops/governance-relationships" target="_blank"&gt;Configure delegated access with governance relationships for multitenant organizations - Unified se…&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2026 14:40:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/how-granular-delegated-admin-privileges-gdap-allows-sentinel/ba-p/4503123</guid>
      <dc:creator>Yossi Basha</dc:creator>
      <dc:date>2026-04-16T14:40:52Z</dc:date>
    </item>
    <item>
      <title>Agentic Use Cases for Developers on the Microsoft Sentinel Platform</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/agentic-use-cases-for-developers-on-the-microsoft-sentinel/ba-p/4503041</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Interested in building an agent with Sentinel platform solutions but not sure where to start? This blog will help you understand some common use cases for agent development that we’ve seen across our partner ecosystem. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;SOC teams don’t need more alerts - they need fast, repeatable investigation and response workflows. Security Copilot agents can help orchestrate the steps analysts perform by correlating across the Sentinel data lake, executing targeted KQL queries, fetching related entities, enriching with context, and producing an evidence-backed decision without forcing analysts to switch tools.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Sentinel platform is&amp;nbsp;a strong foundation&amp;nbsp;for agentic experiences because it exposes a normalized security data layer, an investigation surface based on incidents and entities, and extensive automation capabilities. An agent can use these primitives to correlate identity, endpoint, cloud, and network&amp;nbsp;telemetry;&amp;nbsp;traverse entity relationships; and&amp;nbsp;recommend remediation actions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this blog, I will break down common agentic use cases that developers can implement on Sentinel platform, framed in buildable and repeatable patterns:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Identify&amp;nbsp;the investigation scenario&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Understand&amp;nbsp;the required Sentinel data&amp;nbsp;connectors&amp;nbsp;and KQL queries&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Build&amp;nbsp;enrichment and correlation logic&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Summarize findings with supporting evidence and recommended&amp;nbsp;remediation&amp;nbsp;steps&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H3 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Use Case 1: Identity &amp;amp; Access Intelligence&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Investigation Scenario&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Is this risky sign-in part of an attack path?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Signals Correlated:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Identity access telemetry&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Source user, IPs, target resources, MFA logs&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Authentication outcomes and diversity&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Success vs. failure, Geographic spread&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Identity risk posture&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;User&amp;nbsp;risk level/state&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Post-auth endpoint execution&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Suspicious&amp;nbsp;LOLBins&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Correlation Logic:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;An analyst receives a risky sign-in signal for a user and needs to determine whether the activity reflects expected behavior - such as travel, remote access, or MFA friction - or if it signals the early stage of an identity compromise that could escalate into privileged access and downstream workload impact. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Practical Example:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://securitystore.microsoft.com/solutions/silverfort.silverfort-scp-agent" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Silverfort Identity Threat Triage Agent,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; which is built on a similar framework, takes the user’s UPN as input and builds a bounded, last-24-hour investigation across authentication activity, MFA logs, user risk posture, and post-authentication endpoint behavior.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Outcome:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By correlating identity risk signals, MFA logs, sign-in success and failure patterns, and suspicious execution activity following authentication, the agent connects the initial risky sign-in to endpoint behavior, enabling the analyst to quickly assess compromise likelihood, identify escalation indicators, and determine appropriate remediation actions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 24.9321%" /&gt;&lt;col style="width: 75.0524%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="lia-align-center"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;“Our collaboration with Microsoft Sentinel and Security Copilot underscores the&amp;nbsp;central role&amp;nbsp;identity plays across every stage of attack path triage. By integrating&amp;nbsp;Silverfort’s&amp;nbsp;identity risk signals with Microsoft Entra ID and Defender for Endpoint, and sharing rich telemetry across platforms, we enable Security Copilot&amp;nbsp;Agent&amp;nbsp;to distinguish isolated anomalies from true identity-driven intrusions&amp;nbsp;-&amp;nbsp;while dramatically reducing the manual effort traditionally required for incident response and threat hunting.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;AI-driven agents accelerate analysis,&amp;nbsp;enrich investigative context, reduce dwell time, and speed detection. Instead of relying on complex queries or deep familiarity with underlying data structures, security teams can now perform seamless, identity-centric reasoning within a single interaction.”&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-right"&gt;&lt;SPAN data-contrast="none"&gt;- Frank Gasparovic, Director of Solution Architecture, Technology Alliances, Silverfort&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Use Case 2:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Cyber Resilience, Backup &amp;amp; Recovery&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Investigation Scenario:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Are the threats detected on a backup indicative of production impact and recovery risk?&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Signals Correlated:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Backup threat telemetry:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Backup threat scan alerts, risk analysis events, affected host/workload, detection timestamps&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Cross-vendor security alerts:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Endpoint, network, and cloud security alerts for the same host/workload in the same time window&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Correlation Logic:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The agent correlates threat signals originating from the backup environment with security telemetry associated with same host/workload to validate whether there is corroborating evidence in the production environment and whether activity aligns in time.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Practical Example:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://securitystore.microsoft.com/solutions/commvault.commvault-security-investigation-agent" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Commvault Security Investigation Agent, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;which is built on a similar framework, takes a hostname as input and builds an investigation across Commvault Threat Scan / Risk Analysis events and third-party security telemetry. By correlating backup-originating detections with production security activity for the same host, the agent determines whether the backup threat signal aligns with observable production impact.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Outcome:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By correlating backup threat detections with endpoint, network, and cloud security telemetry while validating timing alignment, event spikes, and data coverage, the agent connects a backup originating threat signal to production evidence, enabling the analyst to quickly assess impact likelihood and determine appropriate actions such as containment or recovery-point validation.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Use Case 3: Network, Exposure &amp;amp; Connectivity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Investigation Scenario&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Is this activity indicative of legitimate remote access, or does it demonstrate suspicious connectivity and access attempts that increase risk to private applications and internal resources.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Signals Correlated:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;User access telemetry:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Source user, source IPs/geo, device/context, destinations &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Auth and enforcement outcomes:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Success vs. failure, MFA allow/block&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Behavior drift:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;new/rare IPs/locations, unusual destination/app diversity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Suspicious activity indicators:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Risky URLs/categories, known-bad indicators, automated/bot-like patterns, repeated denied private app access attempts&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Correlation Logic:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;An analyst receives an alert for a specific user and needs to determine whether the activity reflects expected behavior such as travel, remote work, or VPN usage, or whether it signals the early stages of a compromise that could later extend into private application access.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Practical Example:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://securitystore.microsoft.com/solutions/zscaler1579058425289.zia_zpa_security_copilot" target="_blank" rel="noopener"&gt;Zscaler ZIA ZPA Correlation Agent &lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;starts with a username and builds a bounded, last-24-hour investigation across Zscaler Internet Access and Zscaler Private Access activity. By correlating user internet behavior, access context, and private application interactions, the agent connects the initial Zscaler alert to any downstream access attempts or authentication anomalies, enabling the analyst to quickly assess risk, identify suspicious patterns, and determine whether Zscaler policy adjustments are required.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Outcome:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Provides a last‑24‑hour verdict on whether the activity reflects expected access patterns or escalation toward private application access, and recommends next actions—such as closing as benign drift, escalating for containment, or tuning access policy—based on correlated evidence.&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Use Case&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;4&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Endpoint &amp;amp; Runtime Intelligence&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Investigation Scenario&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Is this process malicious or a legitimate admin action?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Signals Correlated:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Execution context:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Process&amp;nbsp;chain, full command line, signer, unusual path&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Account &amp;amp; logon:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Initiating user, logon type (RDP/service), recent risky sign-ins&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tooling &amp;amp; TTPs:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;LOLBins, credential access hints, lateral movement tooling&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Network behavior:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Suspicious connections, repeated callbacks/beaconing&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Correlation Logic:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A PowerShell alert triggers on a production server. The agent ties the process to its parent (e.g., spawned by a web worker vs. an admin shell), validates the command-line indicators, correlates outbound connections from the same PID to a first-seen destination, and checks for immediate follow-on persistence and any adjacent runtime alerts in the same time window.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Outcome:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Classifies the activity as &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;malicious vs. admin&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; and produces an evidence pack (process tree, key command indicators, destinations, persistence/tamper artifacts) as well as the recommended containment step (isolate host and revoke/reset initiating credentials).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Use Case&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;5&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;: Exposure &amp;amp; Exploitability&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Investigation Scenario&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;What is the likelihood of exploitation and blast radius?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Signals Correlated:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Asset exposure:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Internet-facing status, exposed services/ports, and identity or network paths&amp;nbsp;required&amp;nbsp;to reach the workload&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Exploit activity:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Defender alerts on the resource, IDS/WAF hits, IOC matches, and first&amp;nbsp;seen exploit or probing attempts&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Risk amplification signals:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Internet communication, high&amp;nbsp;privilege access paths, and indicators that the workload processes PII or sensitive data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Blast radius:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Downstream reachability to crown&amp;nbsp;jewel systems (e.g., databases, key vaults) and trust relationships that could enable escalation&lt;/SPAN&gt; &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Correlation Logic:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;An analyst receives a Medium/High Microsoft Defender for Cloud alert on a workload and needs to determine whether it’s a standalone detection or an exploitable exposure that can quickly progress into privilege abuse and data impact. The agent correlates exposure evidence signals such as internet reachability, high-privilege paths, and indicators that workload handles sensitive data by analyzing suspicious network connections in the same bounded time window.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Outcome:&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Produces a resource-specific risk analysis&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;that explains why the Defender for Cloud alert is likely to be exploited, based on&amp;nbsp;asset&amp;nbsp;attack surface&amp;nbsp;and&amp;nbsp;effective privileges,&amp;nbsp;plus any supporting activity in the same 24-hour window.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Use Case&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;6&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;: Threat Intelligence &amp;amp; Adversary Context&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Investigation Scenario&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Is this activity aligned with known attacker behavior?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Signals Correlated:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Behavior sequence:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ordered events identity → execution → network.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Technique mapping:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;MITRE ATT&amp;amp;CK technique IDs, typical progression, and required prerequisites.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Threat intel match:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;campaign/adversary,&amp;nbsp;TTPs, IOCs&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;Correlation Logic:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A chain of identity compromise, PowerShell obfuscation, and periodic outbound HTTPS is observed. The agent maps the sequence to ATT&amp;amp;CK techniques and correlates it with threat intel that matches a known adversary campaign.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Outcome:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Surfaces adversary-aligned behavioral insights and TTP context to help analysts assess intrusion likelihood and guide the next investigation steps.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Summary&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;This blog is intended to help developers better understand the key use cases for building agents with Microsoft Sentinel platform along with practical patterns to apply when designing and implementing agent scenarios.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Need help?&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;If you have any issues as you work to develop your agent, &lt;/SPAN&gt;the &lt;A href="http://aka.ms/appassure" target="_blank" rel="noopener"&gt;App Assure team&lt;/A&gt; is available to assist via our &lt;A href="https://aka.ms/SentinelAdvisoryService" target="_blank" rel="noopener"&gt;Sentinel Advisory Service&lt;/A&gt;. Reach out via our &lt;A href="https://aka.ms/appassurerequest" target="_blank" rel="noopener"&gt;intake form&lt;/A&gt;.&lt;/P&gt;
&lt;H3 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Resources&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Learn more:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;For a practical overview of how ISVs can move from Sentinel data lake onboarding to building agents, see the Accelerate Agent Development blog - &lt;/SPAN&gt;&lt;A href="https://aka.ms/AppAssure_AccelerateAgentDev" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://aka.ms/AppAssure_AccelerateAgentDev&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Get hands-on:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Explore the end-to-end journey from Sentinel data lake onboarding to a working Security Copilot agent through the accompanying lab modules available on GitHub Repo: &lt;/SPAN&gt;&lt;A href="https://github.com/suchandanreddy/Microsoft-Sentinel-Labs" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://github.com/suchandanreddy/Microsoft-Sentinel-Labs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 20 Mar 2026 20:46:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/agentic-use-cases-for-developers-on-the-microsoft-sentinel/ba-p/4503041</guid>
      <dc:creator>Sai_Marapareddy</dc:creator>
      <dc:date>2026-03-20T20:46:02Z</dc:date>
    </item>
    <item>
      <title>RSAC 2026: New Microsoft Sentinel Connectors Announcement</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/rsac-2026-new-microsoft-sentinel-connectors-announcement/ba-p/4503042</link>
      <description>&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Sentinel helps organizations detect, investigate, and respond to security threats across increasingly complex environments. With the rollout of the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/introducing-microsoft-sentinel-data-lake/4434280" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Sentinel data lake&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;in the fall, and the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/app-assures-sentinel-promise-now-extends-to-microsoft-sentinel-data-lake/4454612" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;App Assure-backed Sentinel promise&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; that supports it, customers now have access to long-term, cost-effective storage for security telemetry, creating a solid foundation for emerging Agentic AI experiences.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Since&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/MicrosoftSentinelBlog/ignite-2025-new-microsoft-sentinel-connectors-announcement/4454613" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;our last announcement&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; at Ignite 2025, the Microsoft Sentinel connector ecosystem has expanded rapidly, reflecting continued investment from software development partners building for our shared customers. These connectors bring diverse security signals together, enabling correlation at scale and delivering&amp;nbsp;richer&amp;nbsp;investigation context across the Sentinel platform.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Below is a snapshot of Microsoft Sentinel connectors newly available or recently enhanced since our last announcement, highlighting the breadth of partner solutions contributing data into, and extending the value of, the Microsoft Sentinel ecosystem.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;New and notable integrations&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-table-wrapper styles_table-responsive__MW0lN"&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN lia-align-center"&gt;&lt;table border="2" style="width: 100%; height: 3359.9px; border-width: 2px;"&gt;&lt;tbody&gt;&lt;tr style="height: 171.862px;"&gt;&lt;td style="height: 171.862px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 171.862px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/acronisinternationalgmbh.azure-sentinel-solution-acronis-cyber-protect" target="_blank" rel="noopener"&gt;Acronis Cyber Protect Cloud&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Acronis Cyber Protect Cloud integrates with Microsoft Sentinel to bring data protection and security telemetry into a centralized SOC view. The connector streams alerts, events, and activity data - spanning backup, endpoint protection, and workload security - into Microsoft Sentinel for correlation with other signals. This integration helps security teams investigate ransomware and data-centric threats more effectively, leverage built-in hunting queries and detection rules, and improve visibility across managed environments without adding operational complexity.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 102.37px;"&gt;&lt;td style="height: 102.37px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 102.37px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/anvilogic1725900018831.azure-sentinel-solution-anvilogic" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;Anvilogic&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Anvilogic&amp;nbsp;integrates with Microsoft Sentinel to help security teams operationalize detection engineering at scale. The connector streams&amp;nbsp;Anvilogic&amp;nbsp;alerts into&amp;nbsp;Microsoft&amp;nbsp;Sentinel, giving SOC analysts centralized visibility into&amp;nbsp;high-fidelity&amp;nbsp;detections and faster context for investigation and triage. By unifying detection workflows, reducing alert noise, and improving prioritization, this integration supports more efficient threat detection and response while helping teams extend coverage across evolving attack techniques.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/big-id.azure-sentinel-solution-bigid" target="_blank"&gt;BigID&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;BigID integrates with Microsoft Sentinel to extend data security posture management (DSPM) insights into security operations workflows. The solution brings visibility into sensitive, regulated, and critical data across cloud, SaaS, and on‑premises environments, helping security teams understand where high‑risk data resides and how it may be exposed. By incorporating data‑centric risk context into Sentinel, this integration supports more informed investigation and prioritization, enabling organizations to reduce data‑related risk and align security operations with data protection and compliance objectives.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/commvault.microsoft-sentinel-solution-commvaultsecurityiq" target="_blank"&gt;Commvault Cloud&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Commvault Cloud integrates with Microsoft Sentinel to bring data protection and cyber‑resilience telemetry into security operations workflows. The connector ingests security‑relevant signals from Commvault Cloud—such as backup anomalies, malware and ransomware indicators, and other threat‑related events—into Sentinel, enabling centralized detection, investigation, and automated response. By correlating backup intelligence with broader Sentinel telemetry, this integration helps security teams reduce blind spots, validate the scope of incidents, and improve coordination between security and recovery operations.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 109.062px;"&gt;&lt;td style="height: 109.062px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 109.062px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/cyberark.cyberark_audit_sentinel" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;CyberArk&amp;nbsp;Audit&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;CyberArk Audit integrates with Microsoft Sentinel to centralize visibility into privileged identity and access activity. By streaming detailed audit logs - covering system events, user actions, and administrative activity - into Microsoft Sentinel, security teams can correlate identity-driven risks with broader security telemetry. This integration supports faster investigations, improved monitoring of privileged access, and more effective incident response through automated workflows and enriched context for SOC analysts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 144.87px;"&gt;&lt;td style="height: 144.87px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 144.87px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/cyera1658314682323.azure-sentinel-solution-cyeradspm-v3" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Cyera&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Cyera integrates with Microsoft Sentinel to extend AI-native data security posture management into security operations. The connector brings Cyera’s data context and actionable intelligence across multi-cloud, on-premises, and SaaS environments into Microsoft Sentinel, helping teams understand where sensitive data resides and how it is accessed, exposed, and used. Built on Sentinel’s modern framework, the integration feeds context-rich data risk signals into the Sentinel data lake, enabling more informed threat hunting, automation, and decision-making around data, user, and AI-related risk.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 265.378px;"&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/data443riskmitigationinc1761580347231.azure-sentinel-solution-tacitred-cs-ioc-automation" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;TacitRed&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;CrowdStrike IOC Automation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Data443 TacitRed CS IOC Automation integrates with Microsoft Sentinel to streamline the operationalization of compromised credential intelligence. The solution uses Sentinel playbooks to automatically push TacitRed indicators of compromise into CrowdStrike &lt;SPAN data-olk-copy-source="MessageBody"&gt;via Sentinel playbooks&lt;/SPAN&gt;, helping security teams turn identity-based threat intelligence into action. By automating IOC handling and reducing manual effort, this integration supports faster response to credential exposure and strengthens protection against account-driven attacks across the environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 265.378px;"&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/data443riskmitigationinc1761580347231.azure-sentinel-solution-tacitred-s1-ioc-auto" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;TacitRed&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;SentinelOne&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;IOC Automation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Data443 TacitRed SentinelOne IOC Automation integrates with Microsoft Sentinel to help operationalize identity-focused threat intelligence at the endpoint layer. The solution uses Sentinel playbooks to automatically consume TacitRed indicators and push curated indicators into SentinelOne via Sentinel playbooks and API-based enforcement, enabling faster enforcement of high-risk IOCs without manual handling. By automating the flow of compromised credential intelligence from Sentinel into EDR, this integration supports quicker response to identity-driven attacks and improves coordination between threat intelligence and endpoint protection workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 265.378px;"&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/data443riskmitigationinc1761580347231.azure-sentinel-solution-tacitred-threat-intel" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;TacitRed&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;Threat Intelligence&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Data443 TacitRed Threat Intelligence integrates with Microsoft Sentinel to provide enhanced visibility into identity-based risks, including compromised credentials and high-risk user exposure. The solution ingests curated TacitRed intelligence directly into Sentinel, enriching incidents with context that helps SOC teams identify credential-driven threats earlier in the attack lifecycle. With built-in analytics, workbooks, and hunting queries, this integration supports proactive identity threat detection, faster triage, and more informed response across the SOC.&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 265.378px;"&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/data443riskmitigationinc1761580347231.azure-sentinel-solution-cyren-threat-intel" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Cyren&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;Threat Intelligence&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Cyren Threat Intelligence integrates with Microsoft Sentinel to enhance detection of network-based threats using curated IP reputation and malware URL intelligence. The connector ingests Cyren threat feeds into Sentinel using the Codeless Connector Framework (CCF), transforming raw indicators into actionable insights, dashboards, and enriched investigations. By adding context to suspicious traffic and phishing infrastructure, this integration helps SOC teams improve alert accuracy, accelerate triage, and make more confident response decisions across their environments.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 265.378px;"&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 265.378px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/data443riskmitigationinc1761580347231.azure-sentinel-solution-tacitred-defender-ti" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;TacitRed&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;Defender Threat Intelligence&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Data443 TacitRed Defender Threat Intelligence integrates with Microsoft Sentinel to surface early indicators of credential exposure and identity-driven risk. The solution automatically ingests compromised credential intelligence from TacitRed into Sentinel and can support synchronization of validated indicators with Microsoft Defender Threat Intelligence through Sentinel workflows, helping SOC teams detect account compromise before abuse occurs. By enriching Sentinel incidents with actionable identity context, this integration supports faster triage, proactive remediation, and stronger protection against credential-based attacks.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 109.792px;"&gt;&lt;td style="height: 109.792px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 109.792px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/datawiza.datawiza-sentinel-solution-dap" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Datawiza Access Proxy (DAP)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Datawiza Access Proxy integrates with Microsoft Sentinel to provide centralized visibility into application access and authentication activity. By streaming access and MFA logs from Datawiza into Sentinel, security teams can correlate identity and session-level events with broader security telemetry. This integration supports detection of anomalous access patterns, faster investigation through session traceability, and more effective response using Sentinel automation, helping organizations strengthen Zero Trust controls and meet auditing and compliance requirements.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 178.711px;"&gt;&lt;td style="height: 178.711px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 178.711px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/endace-usa-limited.azure-sentinel-solution-endace" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Endace&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Endace integrates with Microsoft Sentinel to provide deep network visibility by providing always-on, packet-level evidence. The connector enables one-click pivoting from Sentinel alerts directly to recorded packet data captured by EndaceProbes. This helps SOC and NetOps teams reconstruct events and validate threats with confidence. By combining Sentinel’s AI-driven analytics with Endace’s always-on, full-packet capture across on-premises, hybrid, and cloud environments, this integration supports faster investigations, improved forensic accuracy, and more decisive incident response.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/feedlyinc1693853810319.azure-sentinel-solution-feedly" target="_blank" rel="noopener"&gt;Feedly&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;SPAN data-markjs="true" data-ogac="" data-ogab="" data-ogsc="" data-ogsb="" data-olk-copy-source="MessageBody"&gt;Feedly&lt;/SPAN&gt;&amp;nbsp;integrates with Microsoft Sentinel to ingest curated threat intelligence directly into security operations workflows. The connector automatically imports Indicators of Compromise (IoCs) from&amp;nbsp;&lt;SPAN data-markjs="true" data-ogac="" data-ogab="" data-ogsc="" data-ogsb=""&gt;Feedly&lt;/SPAN&gt; Team Boards and folders into Sentinel, enriching detections and investigations with context from the original intelligence articles. By bringing analyst‑curated threat intelligence into Sentinel in a structured, automated way, this integration helps security teams stay current on emerging threats and reduce the manual effort required to operationalize external intelligence.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 88.5938px;"&gt;&lt;td style="height: 88.5938px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 88.5938px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/gigamon-inc.microsoft-sentinel-solution-gigamon" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Gigamon&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Gigamon integrates with Microsoft Sentinel through a new connector that provides access to Gigamon Application Metadata Intelligence (AMI), delivering high-fidelity network-derived telemetry with rich application metadata from inspected traffic directly into Sentinel. This added context helps security teams detect suspicious activity, encrypted threats, and lateral movement faster and with greater precision. By enriching analytics without requiring full packet ingestion, organizations can reduce noise, manage SIEM costs, and extend visibility across hybrid cloud infrastructure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 112.852px;"&gt;&lt;td style="height: 112.852px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 112.852px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/halcyontech1743610828684.azure-sentinel-solution-halcyon" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Halcyon&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Halcyon integrates with Microsoft Sentinel to provide purpose-built ransomware detection and automated containment across the Microsoft security ecosystem. The connector surfaces Halcyon ransomware alerts directly within Sentinel, enabling SOC teams to correlate ransomware behavior with Microsoft Defender and broader Microsoft telemetry. By supporting Sentinel analytics and automation workflows, this integration helps organizations detect ransomware earlier, investigate faster using native Sentinel tools, and isolate affected endpoints to prevent lateral spread and reinfection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 121.081px;"&gt;&lt;td style="height: 121.081px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 121.081px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://aka.ms/RSAC26_Illumio" target="_blank" rel="noopener"&gt;Illumio&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;The Illumio platform identifies and contains threats across hybrid multi-cloud environments. By integrating AI-driven insights with Microsoft Sentinel and Microsoft Graph, Illumio Insights enables SOC analysts to visualize attack paths, prioritize high-risk activity, and investigate threats with greater precision. Illumio Segmentation secures critical assets, workloads, and devices and then publishes segmentation policy back into Microsoft Sentinel to ensure compliance monitoring.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 95.3906px;"&gt;&lt;td style="height: 95.3906px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 95.3906px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/joesecurity.azure-sentinel-solution-joesandbox" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Joe Sandbox&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Joe Sandbox integrates with Microsoft Sentinel to enrich incidents with dynamic malware and URL analysis. The connector ingests Joe Sandbox threat intelligence and automatically detonates suspicious files and URLs associated with Sentinel incidents, returning behavioral and contextual analysis results directly into investigation workflows. By adding sandbox-driven insights to indicators, alerts, and incident comments, this integration helps SOC teams validate threats faster, reduce false positives, and improve response decisions using deeper visibility into malicious behavior.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 108.646px;"&gt;&lt;td style="height: 108.646px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 108.646px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/keepersecurity.keeper-security-integration" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Keeper Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;The Keeper Security integration with Microsoft Sentinel brings advanced password and secrets management telemetry into your SIEM environment. By streaming audit logs and privileged access events from Keeper into Sentinel, security teams gain centralized visibility into credential usage and potential misuse. The connector supports custom queries and automated playbooks, helping organizations accelerate investigations, enforce Zero Trust principles, and strengthen identity security across hybrid environments.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 253.503px;"&gt;&lt;td style="height: 253.503px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 253.503px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/lookoutinc.lookout_mtd_sentinel" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Lookout Mobile Threat Defense (MTD)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Lookout Mobile Threat Defense integrates with Microsoft Sentinel to extend SOC visibility to mobile endpoints across Android, iOS, and Chrome OS. The connector streams device, threat, and audit telemetry from Lookout into Sentinel, enabling security teams to correlate mobile risk signals such as phishing, malicious apps, and device compromise, with broader enterprise security data. By incorporating mobile threat intelligence into Sentinel analytics, dashboards, and alerts, this integration helps organizations detect mobile driven attacks earlier and strengthen protection for an increasingly mobile workforce.&lt;/SPAN&gt; &lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/realtimeboardincdbamiro1645117589045.azure-sentinel-solution-miro" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Miro&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Miro integrates with Microsoft Sentinel to provide centralized visibility into collaboration activity across Miro workspaces. The connector ingests organization-wide audit logs and content activity logs into Sentinel, enabling security teams to monitor authentication events, administrative actions, and content changes alongside other enterprise signals. By bringing Miro collaboration telemetry into Sentinel analytics and dashboards, this integration helps organizations detect suspicious access patterns, support compliance and eDiscovery needs, and maintain stronger oversight of collaborative environments without disrupting productivity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/391c3d87-edc8-4f72-a719-825c022b8eb4.azure-sentinel-solution-obsidian-activity-threat" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Obsidian Activity Threat&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;The Obsidian Threat and Activity Feed for Microsoft Sentinel delivers deep visibility into SaaS and AI applications, helping security teams detect account compromise and insider threats. By streaming user behavior and configuration data into Sentinel, organizations can correlate application risks with enterprise telemetry for faster investigations. Prebuilt analytics and dashboards enable proactive monitoring, while automated playbooks simplify response workflows, strengthening security posture across critical cloud apps.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/onetrustllc1594047340198.azure-sentinel-solution-onetrust" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;OneTrust for Purview DSPM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;OneTrust integrates with Microsoft Sentinel to bring privacy, compliance, and data governance signals into security operations workflows. The connector enriches Sentinel with privacy relevant events and risk indicators from OneTrust, helping organizations detect sensitive data exposure, oversharing, and compliance risks across cloud and non-Microsoft data sources. By unifying privacy intelligence with Sentinel analytics and automation, this integration enables security and privacy teams to respond more quickly to data risk events and support responsible data use and AI-ready governance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/pathlockinc1631410274035.pathlock_tdnr" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Pathlock&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Pathlock integrates with Microsoft Sentinel to bring SAP-specific threat detection and response signals into centralized security operations. The connector forwards security-relevant SAP events into Sentinel, enabling SOC teams to correlate SAP activity with broader enterprise telemetry and investigate threats using familiar SIEM workflows. By enriching Sentinel with SAP security context and focused detection logic, this integration helps organizations improve visibility into SAP landscapes, reduce noise, and accelerate detection and response for risks affecting critical business systems.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/quokka.azure-sentinel-solution-quokka" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Quokka Q-scout&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Quokka Q-scout integrates with Microsoft Sentinel to centralize mobile application risk intelligence across Microsoft Intune-managed devices. The connector automatically ingests app inventories from Intune, analyzes them using Quokka’s mobile app vetting engines, and streams security, privacy, and compliance risk findings into Sentinel. By surfacing app-level risks through Sentinel analytics and alerts, this integration helps security teams identify malicious or high-risk mobile apps, prioritize remediation, and strengthen mobile security posture without deploying agents or disrupting users.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 2px;"&gt;&amp;nbsp;&lt;img /&gt;&lt;/td&gt;&lt;td style="border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/semperis.azure-sentinel-solution-semperislightning" target="_blank"&gt;Semperis Lightning&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Semperis Lightning integrates with Microsoft Sentinel to deliver deep visibility into identity‑centric risk across Active Directory and Microsoft Entra environments. The connector ingests identity security telemetry such as indicators of exposure, Tier 0 assets, and attack path insights into Sentinel, enabling security teams to correlate identity risks with broader security signals. By bringing rich identity context into Sentinel analytics, hunting, and investigations, this integration helps organizations detect, prioritize, and respond to identity‑driven attacks more effectively across hybrid identity infrastructures.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/synqlyinc1759267074521.azure-sentinel-solution-synqly-integration" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;Synqly&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Synqly integrates with Microsoft Sentinel to simplify and scale security integrations through a unified API approach. The connector enables organizations and security vendors to establish a bi‑directional connection with Sentinel without relying on brittle, point‑to‑point integrations. By abstracting common integration challenges such as authentication handling, retries, and schema changes, Synqly helps teams orchestrate security data flows into and out of Sentinel more reliably, supporting faster onboarding of new data sources and more maintainable integrations at scale.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/versasec.azure-sentinel-solution-versaseccms" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Versasec vSEC:CMS&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Versasec vSEC:CMS integrates with Microsoft Sentinel to provide centralized visibility into credential lifecycle and system health events. The connector securely streams vSEC:CMS and vSEC:CLOUD alerts and status data into Sentinel using the Codeless Connector Framework (CCF), transforming credential management activity into correlation-ready security signals. By bringing smart card, token, and passkey management telemetry into Sentinel, this integration helps security teams monitor authentication infrastructure health, investigate credential-related incidents, and unify identity security operations within their SIEM workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/virtualmetric.azure-sentinel-solution-virtualmetric-datastream" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;VirtualMetric Data&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Stream&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;VirtualMetric DataStream integrates with Microsoft Sentinel to optimize how security telemetry is collected, normalized, and routed across the Microsoft security ecosystem. Acting as a high-performance telemetry pipeline, DataStream intelligently filters and enriches logs, sending high-value security data to Sentinel while routing less-critical data to Sentinel data lake or Azure Blob Storage for cost-effective retention. By reducing noise upstream and standardizing logs to Sentinel ready schemas, this integration helps organizations control ingestion costs, improve detection quality, and streamline threat hunting and compliance workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/vmraygmbh1623334327435.microsoft-sentinel-solution-vmray" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;VMRay&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;VMRay integrates with Microsoft Sentinel to enrich SIEM and SOAR workflows with automated sandbox analysis and high-fidelity, behavior-based threat intelligence. The connector enables suspicious files and phishing URLs to be submitted directly from Sentinel to VMRay for dynamic analysis, while validated, high-confidence indicators of compromise (IOCs) are streamed back into Sentinel’s Threat Intelligence repository for correlation and detection. By adding detailed attack-chain visibility and enriched incident context, this integration helps SOC teams reduce investigation time, improve detection accuracy, and strengthen automated response workflows across Sentinel environments.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/xbowinc.xbow-sentinel-connector" target="_blank"&gt;XBOW&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;XBOW integrates with Microsoft Sentinel to bring autonomous penetration testing insights directly into security operations workflows. The connector ingests automated penetration test findings from the XBOW platform into Sentinel, enabling security teams to analyze validated exploit activity alongside alerts, incidents, and other security telemetry. By correlating offensive testing results with Sentinel detections, this integration helps organizations identify monitoring gaps, validate detection coverage, and strengthen defensive controls using real‑world, continuously generated attack evidence.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/zeronetworksltd1629013803351.azure-sentinel-solution-znsegmentaudit" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Zero Networks Segment Audit&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Zero Networks Segment integrates with Microsoft Sentinel to provide visibility into micro-segmentation and access-control activity across the network. The connector can collect audit logs or activities from Zero Networks Segment, enabling security teams to monitor policy changes, administrative actions, and access events related to MFA-based network segmentation. By bringing segmentation audit telemetry into Sentinel, this integration supports compliance monitoring, investigation of suspicious changes, and faster detection of attempts to bypass lateral-movement controls within enterprise environments.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39.6615px;"&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;&lt;img /&gt;&lt;/td&gt;&lt;td style="height: 39.6615px; border-width: 2px;"&gt;
&lt;P class="lia-align-left"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/zscaler1579058425289.zscaler_internet_access_mss" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Zscaler Internet Access (ZIA)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Zscaler Internet Access integrates with Microsoft Sentinel to centralize cloud security telemetry from web and firewall traffic. The connector enables ZIA logs to be ingested into Sentinel, allowing security teams to correlate Zscaler Internet Access signals with other enterprise data for improved threat detection, investigation, and response. By bringing ZIA web, firewall, and security events into Sentinel analytics and hunting workflows, this integration helps organizations gain broader visibility into internet-based threats and strengthen Zero Trust security operations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 39.7836%" /&gt;&lt;col style="width: 60.1855%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In addition to these solutions from our third-party partners, we are also excited to announce the following connector published by the Microsoft Sentinel team:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://securitystore.microsoft.com/solutions/microsoftcorporation1622712991604.sentinel4github" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;GitHub Enterprise Audit Logs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft’s Sentinel Promise&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;For Customers&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Every connector in the Microsoft Sentinel ecosystem is built to work out of the box.&amp;nbsp;In the unlikely event a customer&amp;nbsp;encounters&amp;nbsp;any issue with a connector, the App Assure team stands ready to&amp;nbsp;assist.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;For Software Developers&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Software partners in need of&amp;nbsp;assistance&amp;nbsp;in creating or updating a Sentinel solution can also&amp;nbsp;leverage&amp;nbsp;Microsoft’s Sentinel Promise to support our shared customers. For developers&amp;nbsp;seeking&amp;nbsp;to build agentic experiences&amp;nbsp;utilizing&amp;nbsp;Sentinel data lake, we are excited to announce the launch of&amp;nbsp;our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/SentinelAdvisoryService" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Sentinel Advisory Service&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to guide developers across their Sentinel journey.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Customers and developers alike can reach out to us via&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/appassurerequest" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;our intake form&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Learn More&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Sentinel data lake&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://aka.ms/sentineldatalakeblog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://aka.ms/sentinel/datalake/techcommunityblog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Introducing Microsoft Sentinel data lake&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://aka.ms/sentinel/datalake/learn-docs" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;What is Microsoft Sentinel data lake&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;A href="https://aka.ms/AppAssure_SentinelDeveloper" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Unlocking Developer Innovation with Microsoft Sentinel data lake&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Sentinel Codeless Connector Framework (CCF)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://aka.ms/SentinelCCF_BuildConnector" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Create a codeless connector for Microsoft Sentinel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://aka.ms/SentinelCCFPush" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Public Preview Announcement: Microsoft Sentinel CCF Push&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/what%E2%80%99s-new-in-microsoft-sentinel-march-2026/4499508" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;What’s New in Microsoft Sentinel&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;Monthly Blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;Microsoft App Assure&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="http://aka.ms/appassure" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;App Assure home page&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://aka.ms/AppAssureSD" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;App Assure services&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://aka.ms/AppAssure_Blog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;App Assure blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;A href="https://aka.ms/appassurerequest" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;App Assure Request Assistance Form&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;A href="https://aka.ms/SentinelAdvisoryService" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;App Assure Sentinel Advisory Services announcement&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;A href="https://aka.ms/AppAssure_SentinelPromiseBlog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;App&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Assure’s&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;promise: Migrate to Sentinel with confidence&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="7" data-aria-level="1"&gt;&lt;A href="https://aka.ms/AppAssure_SentinelPromise_datalake" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;App&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Assure’s&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;Sentinel promise now extends to Microsoft Sentinel data lake&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="8" data-aria-level="1"&gt;&lt;A href="https://techcommunity.microsoft.com/blog/MicrosoftSentinelBlog/ignite-2025-new-microsoft-sentinel-connectors-announcement/4454613" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Ignite&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;2025 new Microsoft Sentinel connectors announcement&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Security&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://aka.ms/MicrosoftSecureFutureInitiative" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft’s Secure Future Initiative&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://aka.ms/Microsoft_UnifiedSecOps" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Unified SecOps&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Editor's Note - April 7th, 2026: This blog was updated to include connector descriptions for BigID, Commvault, Semperis, and XBOW.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 18:41:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/rsac-2026-new-microsoft-sentinel-connectors-announcement/ba-p/4503042</guid>
      <dc:creator>JesseKopavi</dc:creator>
      <dc:date>2026-04-07T18:41:22Z</dc:date>
    </item>
    <item>
      <title>Extending App Assure’s Sentinel Promise through the Sentinel Advisory Service</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/extending-app-assure-s-sentinel-promise-through-the-sentinel/ba-p/4503045</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At RSAC&amp;nbsp;last year, we introduced the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/AppAssure_SentinelPromiseBlog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft S&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;entinel Promise&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; with a straightforward commitment to our customers: that third-party data ingestion for Sentinel is reliable, predictable, and scalable without the need for complex custom coding and architecting. In other words, your connectors for Sentinel will just work. That promise has guided App Assure’s work ever since, enabling customers to bring data from across their various security solutions into Sentinel to drive clearer insights and stronger protection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Over the past year, that foundation has proven critical. As organizations move from legacy SIEM platforms to Sentinel, consistent access to high-quality third-party data remains essential, not only for detection and response, but increasingly for advanced analytics and AI-driven security experiences. With the introduction of &lt;/SPAN&gt;&lt;A href="https://aka.ms/AppAssure_SentinelPromise_datalake" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Sentinel data lake&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, customers and partners can now reason over security data&amp;nbsp;cost-effectively and&amp;nbsp;at greater scale. But as many teams are discovering, unlocking those outcomes requires more than simply getting data in the door.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At App Assure,&amp;nbsp;we’ve&amp;nbsp;seen a clear pattern&amp;nbsp;emerge.&amp;nbsp;Software companies&amp;nbsp;often revisit connector design and data modeling multiple times as they&amp;nbsp;help&amp;nbsp;our mutual customers&amp;nbsp;move from ingestion to analytics, and then again as they begin building agentic AI solutions,&amp;nbsp;whether through Security Copilot, MCP server integrations, or custom workflows.&amp;nbsp;Each iteration brings new requirements and new questions, often upstream of where teams initially started.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;That’s&amp;nbsp;why, as an extension of&amp;nbsp;our&amp;nbsp;Sentinel Promise,&amp;nbsp;we’re&amp;nbsp;excited to announce the&amp;nbsp;Sentinel Advisory Service from App Assure.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A Natural Evolution&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Sentinel Advisory Service builds directly on the work we’ve been doing through the Sentinel Promise and our support for Sentinel data lake. Our commitment to helping customers bring third-party data into the platform remains unchanged. What this new service adds is an expert-guided approach focused on helping software companies design customer solutions and data strategies with downstream outcomes in mind.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Rather than addressing ingestion challenges in isolation, the Sentinel Advisory Service is designed to help teams think end-to-end across the Sentinel platform: aligning connector design, data structure, and platform capabilities to support advanced scenarios such as AI agents, analytics jobs, and marketplace-ready solutions. The goal is fewer rebuild cycles, faster progress, and greater confidence as teams move from data ingestion to meaningful security outcomes.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What Sentinel Advisory Service Offers&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Sentinel Advisory Service is a no-cost program delivered by App Assure in close collaboration with Sentinel engineering to continually make it easier to build and maintain connectors that utilize data lake and facilitate building agentic AI solutions on top of it.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Key areas of support include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Technical workshops&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;covering best practices for Sentinel integrations, data lake usage, and agent development&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Advisory guidance&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; on&amp;nbsp;leveraging&amp;nbsp;Sentinel platform features to support&amp;nbsp;AI-driven&amp;nbsp;security scenarios&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Code samples and design reviews&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to unblock development and improve solution quality&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Break/fix&amp;nbsp;assistance&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and escalation paths to Microsoft engineers&amp;nbsp;to&amp;nbsp;assist&amp;nbsp;with software development and provide product feedback&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Early Partner Momentum&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’re already seeing strong momentum from software companies participating in early advisory engagements. Partners are working with App Assure to refine Sentinel integrations and explore new agentic AI scenarios built on a solid data foundation. Their work reflects a broader shift across the ecosystem: moving beyond connectivity alone, toward building differentiated, outcome-driven security solutions on Sentinel.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Below are some of the partners&amp;nbsp;we’ve&amp;nbsp;already worked with and what they have to say about the experience:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;table border="1" style="width: 100%; height: 833.606px; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 33.6406%" /&gt;&lt;col style="width: 66.344%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr style="height: 232.812px;"&gt;&lt;td style="height: 232.812px;"&gt;&lt;img /&gt;
&lt;P class="lia-align-center"&gt;Srinivas Chakravarty, VP of Cloud &amp;amp; AI Ecosystem, Gigamon&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 232.812px;"&gt;“Through active collaboration with Microsoft Security Engineering and the App Assure team, we quickly created and published our CCF-Push connector to deliver enriched network-derived telemetry from the Gigamon Deep Observability Pipeline into Sentinel data lake. In a parallel sprint, with the introduction of our initial Security Copilot Agent, security teams can apply AI to this network intelligence within Sentinel to uncover threats hidden in encrypted and lateral traffic that might otherwise go undetected.”&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 211.823px;"&gt;&lt;td class="lia-align-center" style="height: 211.823px;"&gt;&lt;img /&gt;
&lt;P&gt;Mario Espinoza, Chief Product Officer, Illumio&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 211.823px;"&gt;"Illumio is proud to partner with Microsoft, proving together that cybersecurity can scale. Microsoft's product management teams collaborated closely with Illumio on several integrations, most recently Illumio Insights Agent for Security Copilot and Illumio for Microsoft Sentinel Data Lake Connector. Together, Illumio and Sentinel solutions empower customers to correlate joint security threat findings and ensure breaches don't become disasters."&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 214.818px;"&gt;&lt;td class="lia-align-center" style="height: 214.818px;"&gt;&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Duncan Barnes,&amp;nbsp;Director&amp;nbsp;Global Alliances, RSA&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 214.818px;"&gt;&lt;SPAN data-contrast="auto"&gt;"The partnership between RSA and Microsoft, exemplified by the &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;RSA Advisor for Admin Threats&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; agent, underscores the value of the Sentinel Advisory Service. It highlights how collaborative innovation drives differentiated, outcome-driven security solutions, ensuring customers can migrate with confidence and harness the full potential of agentic AI to find, prioritize, and resolve threats faster and more efficiently."&lt;/SPAN&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.8307px;"&gt;&lt;td class="lia-align-center" style="height: 34.8307px;"&gt;&lt;img /&gt;
&lt;P&gt;Vlad Sushitsky, Research Engineer, Semperis&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 34.8307px;"&gt;“We developed a Security Copilot agent that correlates Tier-0 classifications, identity attack paths, and Indicators of Exposure for any given identity. The correlation is powered by Semperis Lightning telemetry, streamed into the Data Lake through our new data connector. What used to take analysts hours of manually pivoting across multiple tables to piece together an identity's risk profile now happens instantly in a single conversation. This gives our joint customers significantly better visibility into identity threats, faster investigations, and substantial cost savings. Developing the agent on Security Copilot was smooth and fast — thanks to great collaboration with the Microsoft team, we had it up and running in a matter of days.”&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.8307px;"&gt;&lt;td class="lia-align-center" style="height: 34.8307px;"&gt;&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Harman Kaur, SVP Technology Strategy and AI, Tanium &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 34.8307px;"&gt;&lt;SPAN data-contrast="auto"&gt;"This partnership with Microsoft represents a new level of AI and security integration. Through the Microsoft Sentinel Advisory Service, Tanium integrated AI agents into Microsoft Security Copilot, including the recently launched Tanium Security Triage Agent with Identity Insights. By unifying Tanium’s real-time endpoint intelligence with identity information from the Microsoft Sentinel data lake and Entra ID, security analysts gain the speed, precision and confidence needed to stop threats before they escalate."&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.8307px;"&gt;&lt;td class="lia-align-center" style="height: 34.8307px;"&gt;&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Ariel Negrin, Worldwide Head of Partnerships and Alliances, Upwind&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 34.8307px;"&gt;&lt;SPAN data-contrast="auto"&gt;"Through the Sentinel Advisory Service and the broader App Assure engineering teams, Microsoft has been side&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;by&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;side&amp;nbsp;with us, from connector and data model design to advanced AI scenarios, helping us architect for&amp;nbsp;high&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;quality&amp;nbsp;ingestion,&amp;nbsp;graph&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;aware&amp;nbsp;context, and AI security use cases. That level of&amp;nbsp;hands&lt;/SPAN&gt;‑&lt;SPAN data-contrast="auto"&gt;on guidance and roadmap alignment means our joint customers get faster time to value, fewer integration rebuilds, and a more intelligent security experience built on top of the Microsoft security stack they already trust."&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.8307px;"&gt;&lt;td class="lia-align-center" style="height: 34.8307px;"&gt;&lt;img /&gt;
&lt;P&gt;Matthew Payne, Field Engineer, XBOW&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 34.8307px;"&gt;"The team worked alongside us from the start, not just on ingestion, but on designing how XBOW's penetration testing data should flow into Sentinel to actually drive downstream outcomes. Their engineering guidance helped us build agents for Security Copilot and a Sentinel data connector that turns validated exploit paths into actionable security telemetry. The result is that joint customers can trigger a pentest, see real findings in Sentinel alongside their existing alerts, and investigate and remediate without leaving the Microsoft security console."&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.8307px;"&gt;&lt;td style="height: 34.8307px;"&gt;&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;SPAN data-contrast="auto"&gt;Paul Lopez, &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Principal Solutions Architect, Zscaler&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 34.8307px;"&gt;&lt;SPAN data-contrast="auto"&gt;"Organizations looking to improve visibility across internet and private access activities benefit from integrating these signals. Through collaboration with Microsoft’s App Assure team, Zscaler’s ZIA–ZPA Correlation Agent for Security Copilot leverages data from the Sentinel Data Lake to deliver a single, cohesive view, simplifying investigations and enabling faster response times."&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Getting Started&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Sentinel Advisory Service is available today for developers building on Microsoft Sentinel and Sentinel data lake. If you’re enhancing an existing connector, designing an AI-driven security solution, or planning how to translate data into action on the Sentinel platform, App Assure is here to help.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As always, our focus remains on customer confidence, ensuring that as Sentinel evolves, the ecosystem around it can evolve just as reliably. The Sentinel Advisory Service is the next step in delivering on that promise. Reach out to us&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/AppAssureRequest" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 20:23:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/extending-app-assure-s-sentinel-promise-through-the-sentinel/ba-p/4503045</guid>
      <dc:creator>MikeAdams</dc:creator>
      <dc:date>2026-03-20T20:23:18Z</dc:date>
    </item>
    <item>
      <title>What’s new in Microsoft Sentinel: RSAC 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-rsac-2026/ba-p/4503971</link>
      <description>&lt;P&gt;Security is entering a new era, one defined by explosive data growth, increasingly sophisticated threats, and the rise of AI-enabled operations. To keep pace, security teams need an AI-powered approach to collect, reason over, and act on security data at scale. At&amp;nbsp;&lt;A href="https://www.rsaconference.com/usa" target="_blank" rel="noopener"&gt;RSA Conference 2026 (RSAC)&lt;/A&gt;, we’re unveiling the next wave of Sentinel innovations designed to help organizations move faster, see deeper, and defend smarter with AI-ready tools. These updates include AI-driven &lt;A class="lia-internal-link" href="#community--1-playbook-go" target="_blank" rel="noopener" data-lia-auto-title="playbooks" data-lia-auto-title-active="0"&gt;playbooks&lt;/A&gt; that accelerate SOC automation, &lt;A class="lia-internal-link" href="#community--1-gdap-go" target="_blank" rel="noopener" data-lia-auto-title="Granular Delegated Admin Privileges (GDAP)" data-lia-auto-title-active="0"&gt;Granular Delegated Admin Privileges (GDAP)&lt;/A&gt; and granular role-based access controls (RBAC) that let you scale your SOC, &lt;A class="lia-internal-link" href="#community--1-connectors-go" target="_blank" rel="noopener" data-lia-auto-title="accelerated data onboarding" data-lia-auto-title-active="0"&gt;accelerated data onboarding&lt;/A&gt; through new connectors, and &lt;A class="lia-internal-link" href="#community--1-federation-go" target="_blank" rel="noopener" data-lia-auto-title="data federation" data-lia-auto-title-active="0"&gt;data federation&lt;/A&gt; that enables analysis in place without duplication. Together, they give teams greater clarity, control, and speed.&lt;/P&gt;
&lt;P&gt;Come see us at RSAC to view these innovations in action. Hear from Sentinel leaders during our exclusive &lt;A href="http://microsoftsecurityevents.eventbuilder.com/RSACMicrosoftEvents26?ref=blog_RSACpreevent" target="_blank" rel="noopener"&gt;Microsoft Pre-Day&lt;/A&gt;, then visit Microsoft booth #5744 for demos, theater sessions, and conversations with Sentinel experts.&lt;/P&gt;
&lt;P&gt;Read on to explore what’s new. See you at RSAC!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Sentinel feature innovations:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-siem-go" target="_blank" rel="noopener" data-lia-auto-title="Sentinel SIEM" data-lia-auto-title-active="0"&gt;Sentinel SIEM&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-datalake-go" target="_blank" rel="noopener" data-lia-auto-title="Sentinel data lake" data-lia-auto-title-active="0"&gt;Sentinel data lake&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-graph-go" target="_blank" rel="noopener" data-lia-auto-title="Sentinel graph" data-lia-auto-title-active="0"&gt;Sentinel graph&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-mcp-go" target="_blank" rel="noopener" data-lia-auto-title="Sentinel MCP" data-lia-auto-title-active="0"&gt;Sentinel MCP&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-intel-go" target="_blank" rel="noopener" data-lia-auto-title="Threat Intelligence" data-lia-auto-title-active="0"&gt;Threat Intelligence&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-store-go" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Security Store" data-lia-auto-title-active="0"&gt;Microsoft Security Store&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-promos-go" target="_blank" rel="noopener" data-lia-auto-title="Sentinel promotions" data-lia-auto-title-active="0"&gt;Sentinel promotions&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;&lt;a id="community--1-siem-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Sentinel SIEM&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H4 class="lia-linked-item"&gt;&lt;a id="community--1-playbook-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG&gt;Playbook generator [Now in public preview&lt;/STRONG&gt;&lt;STRONG&gt;]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Sentinel playbook generator delivers a new era of automation capabilities. You can vibe code complex automations, integrate with different tools to ensure timely and compliant workflows throughout your SOC and feel confident in the results with built in testing and documentation. Customers and partners are already seeing benefit from this innovation.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;“The playbook generator gives security engineers the flexibility and speed of AI-assisted coding&amp;nbsp; while delivering the deterministic outcomes that enterprise security operations require. It's the best of both worlds, and it lives natively in Defender where the engineers already work.”&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;– Jaime Guimera Coll | Security and AI Architect | BlueVoyant&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;A href="https://aka.ms/PlaybookGenBlog" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt; about playbook generator.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;SIEM migration experience [General availability now]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Sentinel SIEM migration experience helps you plan and execute SIEM migrations through a guided, in-product workflow. You can upload Splunk or QRadar exports to generate recommendations for best‑fit Sentinel analytics rules and required data connectors, then assess migration scope, validate detection coverage, and migrate from Splunk or QRadar to Sentinel in phases while tracking progress.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;“The tool helps turn a Splunk to Sentinel migration into a practical decision process. It gives clear visibility into which detections are relevant, how they align to real security use cases, and where it makes sense to enable or prioritize coverage—especially with cost and data sources in mind.”&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;&lt;STRONG&gt;Deniz Mutlu | Director | Swiss Post Cybersecurity Ltd&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/siem-migration?tabs=splunk" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt; about SIEM migration experience.&lt;/P&gt;
&lt;H4&gt;&lt;a id="community--1-gdap-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;GDAP, unified RBAC, and row-level RBAC for Sentinel [Public preview, April 1]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;As Sentinel environments grow for enterprises, MSSPs, hyperscalers, and partners operating across shared or multiple environments, the challenge becomes managing access control efficiently and consistently at scale. Sentinel’s expanded permissions and access capabilities are designed to meet these needs.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Granular Delegated Admin Privileges (GDAP)&lt;/STRONG&gt; lets you streamline management across multiple governed tenants using your primary account, based on existing GDAP relationships.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unified RBAC&lt;/STRONG&gt; allows you to opt in to&lt;STRONG&gt; &lt;/STRONG&gt;managing permissions for Sentinel workspaces through a single pane of glass, configuring and enforcing access across Sentinel experiences in the analytics tier and data lake in the Defender portal. This simplifies administration and improves operational efficiency by reducing the number of permission models you need to manage.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Row-level RBAC scoping within tables&lt;/STRONG&gt; enables precise, scoped access to data in the Sentinel data lake. Multiple SOC teams can operate independently within a shared Sentinel environment, querying only the data they are authorized to see, without separating workspaces or introducing complex data flow changes. Consistent, reusable scope definitions ensure permissions are applied uniformly across tables and experiences, while maintaining strong security boundaries.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To learn more, read our technical deep dives on &lt;A href="https://aka.ms/RBACnews" target="_blank" rel="noopener"&gt;RBAC&lt;/A&gt; and &lt;A href="https://aka.ms/GDAPNews26" target="_blank" rel="noopener"&gt;GDAP&lt;/A&gt;.&lt;/P&gt;
&lt;H1&gt;&lt;a id="community--1-datalake-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Sentinel data lake&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H4&gt;&lt;a id="community--1-federation-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Sentinel data federation [Public preview, April 1]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Sentinel data federation lets you analyze security data in place without copying or duplicating your data. Powered by Microsoft Fabric, you can now federate data from Fabric, Azure Data Lake Storage (ADLS), and Azure Databricks into Sentinel data lake. Federated data appears alongside native Sentinel data, so you can use familiar tools like KQL hunting, notebooks, and custom graphs to correlate signals and investigate across your entire digital estate, all while preserving governance and compliance. You can start analyzing data in place and progressively ingest data into Sentinel for deeper security insights, advanced automation, and AI-powered defense at scale. You are billed only when you run analytics on federated data using &lt;A href="https://aka.ms/MicrosoftSentinel_Pricing" target="_blank" rel="noopener"&gt;existing Sentinel data lake query and advanced insights meters&lt;/A&gt;.&lt;/P&gt;
&lt;img&gt;Figure 1: Federated data appears alongside native Sentinel tables for unified investigation and hunting&lt;/img&gt;
&lt;H4&gt;&lt;STRONG&gt;Sentinel cost estimation tool [Public Preview, &lt;/STRONG&gt;&lt;STRONG&gt;April&lt;/STRONG&gt;&lt;STRONG&gt; 9]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The new Sentinel cost estimation tool offers all Microsoft customers and partners a guided, meter-level cost estimation experience that makes pricing transparent and predictable. A built-in three-year cost projection lets you model data growth and ramp-up over time, anticipate spend, and avoid surprises. Get transparent estimates into spend as you scale your security operations. All other customers can continue to use the &lt;A href="https://azure.microsoft.com/en-us/pricing/calculator/" target="_blank" rel="noopener"&gt;Azure calculator&lt;/A&gt; for Sentinel pricing estimates. See the &lt;A href="https://www.microsoft.com/en-us/security/pricing/microsoft-sentinel/?msockid=13c31299ffe1622232f30313fe8b631f" target="_blank" rel="noopener"&gt;Sentinel pricing page&lt;/A&gt; for more information.&lt;/P&gt;
&lt;img&gt;Figure 2: Plan your Sentinel investment with guided, meter-level cost breakdowns and three-year projections&lt;/img&gt;
&lt;H4&gt;&lt;a id="community--1-connectors-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Sentinel data connectors&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;A365 Observability connector [Public preview, April 15&lt;/STRONG&gt;&lt;STRONG&gt;]&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Bring AI agent telemetry into the Sentinel data lake to investigate agent behavior, tool usage, prompts, reasoning and execution using hunting, graph, and MCP workflows.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;GitHub audit log connector using API polling [General availability, March 6&lt;/STRONG&gt;&lt;STRONG&gt;]&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Ingest GitHub enterprise audit logs into Sentinel to monitor user and administrator activity, detect risky changes, and investigate security events across your development environment.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Google Kubernetes Engine (GKE) connector [&lt;/STRONG&gt;&lt;STRONG&gt;General availability, March 6&lt;/STRONG&gt;&lt;STRONG&gt;]&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Collect Google Kubernetes Engine (GKE) audit and workload logs in Sentinel to monitor cluster activity, analyze workload behavior, and detect security threats across Kubernetes environments.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Entra and Azure Resource Graph (ARG) connector &lt;/STRONG&gt;&lt;STRONG&gt;enhancements&lt;/STRONG&gt;&lt;STRONG&gt; [&lt;/STRONG&gt;&lt;STRONG&gt;Public preview, April 15&lt;/STRONG&gt;&lt;STRONG&gt;]&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Enable new Entra assets (EntraDevices, EntraOrgContacts) and ARG assets (ARGRoleDefinitions) in existing asset connectors, expanding inventory coverage and powering richer, built‑in graph experiences for greater visibility.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;With over 350 Sentinel data connectors, customers achieve broad visibility into complex digital environments and can expand their security operations effectively.&lt;/P&gt;
&lt;BLOCKQUOTE class="lia-indent-padding-left-30px"&gt;
&lt;P&gt;&lt;STRONG&gt;“Microsoft Sentinel data lake forms the core of our agentic SOC. By unifying large volumes of Microsoft and third-party data, enabling graph-based analysis, and supporting MCP-driven workflows, it allows us to investigate faster, at lower cost, and with greater confidence.”&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;– Øyvind Bergerud | Head of Security Operations | Storebrand&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/data-connectors-reference#github-enterprise-audit-log-via-codeless-connector-framework" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt; about Sentinel data connectors.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Sentinel connector builder agent &lt;/STRONG&gt;&lt;STRONG&gt;using Sentinel Visual Studio Code extension [Public preview, March 31]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class=""&gt;Build Sentinel data connectors in minutes instead of weeks using the AI‑assisted Connector Builder agent in Visual Studio Code. This low‑code experience guides developers and ISVs end-to-end, automatically generating schemas, deployment assets, connector UI, secure secret handling, and polling logic. Built‑in validation surfaces issues early, so you can validate event logs before deployment and ingestion.&lt;/P&gt;
&lt;P class=""&gt;&lt;STRONG&gt;Example prompt in GitHub Copilot Chat:&lt;/STRONG&gt;&lt;/P&gt;
&lt;BLOCKQUOTE class="lia-indent-padding-left-30px"&gt;
&lt;P&gt;@sentinel-connector-builder Create a new connector for OpenAI audit logs using https://api.openai.com/v1/organization/audit_logs&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;img&gt;Figure 3: The Sentinel Connector Builder agent in VS Code guides you through building a data connector end-to-end, from API documentation to deployment-ready assets&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/create-custom-connector-builder-agent" aria-label="Link Get started" target="_blank"&gt;Get started&lt;/A&gt; with custom connectors and&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/accelerate-connectors-development-using-ai-agent-in-microsoft-sentinel/4507019" aria-label="Link learn more in our blog" target="_blank"&gt;learn more in our blog&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Data filtering and splitting [Public preview, March 30]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;As security teams ingest more data, the challenge shifts from scale to relevance. With filtering and splitting now built into the Defender portal, teams can shape data before it lands in Sentinel, without switching tools or managing custom JSON files. Define simple KQL‑based transformations directly in the UI to filter low‑value events and intelligently route data, making ingestion optimization faster, more intuitive, and easier to manage at scale.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Filtering&lt;/STRONG&gt; at ingest time allows you to remove low-value or benign events to reduce noise, cut unnecessary processing, and ensure that high-signal data drives detections and investigations.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Splitting&lt;/STRONG&gt; enables intelligent routing of data between the analytics tier and the data lake tier based on relevance and usage.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Together, these two capabilities help you balance cost and performance while scaling data ingestion sustainably as your digital estate grows.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Create workbook reports&lt;/STRONG&gt;&lt;STRONG&gt; directly from the data lake [Public preview, April 1]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Sentinel workbooks can now directly run on the data lake using KQL, enabling you to visualize and monitor security data straight from the data lake. By selecting the data lake as the workbook data source, you can now create trend analysis and executive reporting.&lt;/P&gt;
&lt;H1&gt;&lt;a id="community--1-graph-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Sentinel graph&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H4&gt;&lt;STRONG&gt;Custom graphs&lt;/STRONG&gt;&lt;STRONG&gt; [Public preview, April 1]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://aka.ms/sentinel/graph/ignite" target="_blank" rel="noopener"&gt;Custom graphs&lt;/A&gt; let you build tailored security graphs tuned to your unique security scenarios using data from Sentinel data lake as well as non-Microsoft sources. With custom graph, powered by Fabric, you can build, query, and visualize connected data, uncover hidden patterns and attack paths, and help surface risks that are hard to detect when data is analyzed in isolation. These graphs provide the knowledge context that enables AI-powered agent experiences to work more effectively, speeding investigations, revealing blast radius, and helping you move from noisy, disconnected alerts to confident decisions at scale. In the words of our preview customers:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;“We ingested our Databricks management-plane telemetry into the Sentinel data lake and built a custom security graph. Without writing a single detection rule, the graph surfaced unusual patterns of activity and overprivileged access that we escalated for investigation. We didn't know what we were looking for, the graph surfaced the risk for us by revealing anomalous activity patterns and unusual access combinations driven by relationships, not alerts.” &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;– SVP, Security Solutions | Financial Services organization&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Custom graph API usage for creating graph and querying graph will be billed starting April 1, 2026, according to the Sentinel graph meter.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Creating custom graph&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Using the Sentinel VS Code extension, you can generate graphs to validate hunting hypotheses, such as understanding attack paths and blast radius of a phishing campaign, reconstructing multi‑step attack chains, and identifying structurally unusual or high‑risk behavior, making it accessible to your team and AI agents. Once persisted via a schedule job, you can access these custom graphs from the ready-to-use section in the graph experience in the Defender portal.&lt;/P&gt;
&lt;img&gt;Figure 4: Use AI-assisted vibe coding in Visual Studio Code to create tailored security graphs powered by Sentinel data lake and Fabric&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;Graphs experience in &lt;/STRONG&gt;&lt;STRONG&gt;the Microsoft Defender portal&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;After creating your custom graphs, you can access them in the graphs section of the Defender portal under Sentinel. From there, you’ll be able to perform interactive graph-based investigations, such as using a graph built for phishing analysis to help you quickly evaluate the impact of a recent incident, profile the attacker, and trace its paths across Microsoft telemetry and third-party data. The new graph experience lets you run Graph Query Language (GQL) queries, view the graph schema, visualize the graph, view graph results in tabular format, and interactively travers the graph to the next hop with a simple click.&lt;/P&gt;
&lt;img&gt;Figure 5: Query, visualize, and traverse custom graphs with the new graph experience in Sentinel&lt;/img&gt;
&lt;H1&gt;&lt;a id="community--1-mcp-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Sentinel MCP&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H4&gt;&lt;STRONG&gt;Sentinel MCP entity analyzer [General availability, April 1]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Entity analyzer provides reasoned, out-of-the-box risk assessments that help you quickly understand whether a URL or user identity represents potential malicious activity. The capability analyzes data across modalities including threat intelligence, prevalence, and organizational context to generate clear, explainable verdicts you can trust. Entity analyzer integrates easily with your agents through Sentinel MCP server connections to first-party and third-party AI runtime platforms, or with your SOAR workflows through Logic Apps. The entity analyzer is also a trusted foundation for the Defender Triage Agent and delivers more accurate alert classifications and deeper investigative reasoning. This removes the need to manually engineer evaluation logic and creates trust for analysts and AI agents to act with higher accuracy and confidence. &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-data-exploration-tool#entity-analyzer" target="_blank" rel="noopener"&gt;Learn more about entity analyzer&lt;/A&gt; and in our blog &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/announcing-ai-entity-analyzer-in-microsoft-sentinel-mcp-server---public-preview/4476230" target="_blank" rel="noopener"&gt;here&lt;/A&gt;. Entity analyzer will be billed starting April 1, 2026, based on Security Compute Units (SCU) consumption. &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-billing" target="_blank" rel="noopener"&gt;Learn more about MCP billing.&lt;/A&gt;&lt;/P&gt;
&lt;img&gt;Figure 6: Entity analyzer delivers explainable, multi-signal risk assessments for URLs and user identities directly within your investigation workflow&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Sentinel MCP graph tool collection [Public preview&lt;/STRONG&gt;&lt;STRONG&gt;, April 20]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Graph tool collection helps you visualize and explore relationships between identities and device assets, threats and activities signals ingested by data connectors and alerted by analytic rules. The tool provides a clear graph view that highlights dependencies and configuration gaps, which makes it easier to understand how content interacts across your environment. This helps security teams assess coverage, optimize content deployment, and identify areas that may need tuning or additional data sources, all from a single, interactive workspace. Executing graph queries via the MCP tools will trigger the graph meter.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Claude MCP connector [Public preview, April 1]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Anthropic Claude can connect to Sentinel through a custom MCP connector, giving you AI-assisted analysis across your Sentinel environment. Microsoft provides step-by-step guidance for configuring a custom connector in Claude that securely connects to a Sentinel MCP server. With this connection you can summarize incidents, investigate alerts, and reason over security signals while keeping data inside Microsoft's security boundary. Access to large language models (LLMs) is managed through Microsoft authentication and role-based controls, supporting faster triage and investigation workflows while maintaining compliance and visibility.&lt;/P&gt;
&lt;H1&gt;&lt;a id="community--1-intel-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Threat Intelligence&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H4&gt;&lt;STRONG&gt;CVEs of interest in the Threat Intelligence Briefing Agent [Public preview in April]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Threat Intelligence Briefing Agent delivers curated intelligence based on your organization’s configuration, preferences, and unique industry and geographic needs. CVEs of interest which highlights vulnerabilities actively discussed across the security landscape and assesses their potential impact on your environment, delivering more timely threat intelligence insights. The agent automatically incorporates internet exposure data powered by the Sentinel platform to surface threats targeting technologies exposed in your organization. Together, these enhancements help you focus faster on the threats that matter most, without manual investigation.&lt;/P&gt;
&lt;H1&gt;&lt;a id="community--1-store-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Microsoft Security Store&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H4&gt;&lt;STRONG&gt;Security Store embedded in Entra [General availability, March 23]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;As identity environments grow more complex, teams need to move faster and extend Entra with trusted third‑party capabilities that address operational, compliance, and risk challenges. The Security Store embedded directly into Entra lets you discover and adopt Entra‑ready agents and solutions in your workflow. You can extend Entra with identity‑focused agents that surface privileged access risk, identity posture gaps, network access insights, and overall identity health, turning identity data into clear recommendations and reports teams can use immediately. You can also enhance Entra with Verified ID and External ID integrations that strengthen identity verification, streamline account recovery, and reduce fraud across workforce, consumer, and external identities.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Security Store embedded in Microsoft Purview [General availability, March 31]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Extending data security across the digital estate requires visibility and enforcement into new data sources and risk surfaces, often requiring a partnered approach. The Security Store embedded directly into Purview lets you discover and evaluate integrated solutions inside your data security workflows. Relevant partner capabilities surface alongside context, making it easier to strengthen data protection, address regulatory requirements, and respond to risk without disrupting existing processes. You can quickly assess which solutions align to data security scenarios, especially with respect to securing AI use, and how they can leverage established classifiers, policies, and investigation workflows in Purview. Keeping integration discovery in‑flow and purchases centralized through the Security Store means you move faster from evaluation to deployment, reducing friction and maintaining a secure, consistent transaction experience.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Security Store Advisor [General availability, March 23]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Security teams today face growing complexity and choice. Teams often know the security outcome they need, whether that's strengthening identity protection, improving ransomware resilience, or reducing insider risk, but lack a clear, efficient way to determine which solutions will help them get there. Security Store Advisor provides a guided, natural-language discovery experience that shifts security evaluation from product‑centric browsing to outcome‑driven decision‑making. You can describe your goal in plain language, and the Advisor surfaces the most relevant Microsoft and partner agents, solutions, and services available in the Security Store, without requiring deep product knowledge. This approach simplifies discovery, reduces time spent navigating catalogs and documentation, and helps you understand how individual capabilities fit together to deliver meaningful security outcomes.&lt;/P&gt;
&lt;H1&gt;&lt;a id="community--1-promos-go" class="lia-anchor"&gt;&lt;/a&gt;&lt;STRONG class="lia-linked-item"&gt;Sentinel promotions&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H4&gt;&lt;STRONG&gt;Extending signups for promotional 50 GB commitment tier [Through June 2026]&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Sentinel promotional 50 GB commitment tier offers small and mid-sized organizations a cost-effective entry point into Sentinel. Sign up for the 50 GB commitment tier until June 30, 2026, and maintain the promotional rate until March 31, 2027. This promotion is available globally with regional variations in pricing and accessible through EA, CSP, and Direct channels. &lt;A href="https://aka.ms/MSentinelpricing" target="_blank" rel="noopener"&gt;Visit the Sentinel pricing page for details and to get started.&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;&lt;STRONG&gt;Sentinel RSAC 2026 sessions&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;All week – Sentinel product demos, Microsoft Booth #5744&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Mon Mar 23, 3:55 PM – RSAC 2026 main stage Keynote with CVP Vasu Jakkal&lt;BR /&gt;&lt;A href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1765210885629001yTWd" target="_blank" rel="noopener"&gt;[KEY-M10W] Ambient and autonomous security: Building trust in the agentic AI era&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Tue Mar 24, 10:30 AM – Live Q&amp;amp;A session, Microsoft booth #5744 and online&lt;BR /&gt;&lt;A href="https://techcommunity.microsoft.com/event/microsoft-security-events/ask-microsoft-anything-data--ai-security-in-the-real-world/4488610" target="_blank" rel="noopener"&gt;Ask me anything with Microsoft Security SMEs and real practitioners&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Tue Mar 24, 11 AM – Sentinel data lake theater session, Microsoft booth #5744&lt;BR /&gt;From signals to insights: How Microsoft Sentinel data lake powers modern security operations&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Tue Mar 24, 2 PM – Sentinel SIEM theater session, Microsoft booth #5744&lt;BR /&gt;Vibe-coding SecOps automations with the Sentinel playbook generator&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Wed Mar 25, 12 PM – Executive event at Palace Hotel with Threat Protection GM Scott Woodgate&lt;BR /&gt;&lt;A href="https://microsoftsecurityevents.eventbuilder.com/events/11f0faf1ae4b7b1092042d2e601772ba?ref=blog_RSACpreevent" target="_blank" rel="noopener"&gt;The AI risk equation: Visibility, control, and threat acceleration&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Wed Mar 25, 1:30 PM – Sentinel graph theater session, Microsoft booth #5744&lt;BR /&gt;Bringing knowledge-driven context to security&amp;nbsp;with Microsoft Sentinel graph&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Wed Mar 25, 5 PM – MISA theater session, Microsoft booth #5744&lt;BR /&gt;Cut SIEM costs without reducing protection: A Sentinel data lake case study&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Thu Mar 26, 1 PM – Security Store theater session, Microsoft booth #5744&lt;BR /&gt;What's next for Security Store: Expanding in portal and smarter discovery&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;All week – 1:1 meetings with Microsoft security experts&lt;BR /&gt;&lt;A href="https://aka.ms/RSAC/MeetingRequest" target="_blank" rel="noopener"&gt;Meet with Microsoft Defender and Sentinel SIEM and Defender Security Operations&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;&lt;STRONG&gt;A&lt;/STRONG&gt;&lt;STRONG&gt;dditional resources&lt;/STRONG&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/playlist?list=PL3ZTgFEc7LyvM-OlDTB8BDV_aARfmBMG9" target="_blank" rel="noopener"&gt;Sentinel data lake video playlist&lt;/A&gt;&lt;BR /&gt;Explore the full capabilities of Sentinel data lake as a unified, AI-ready security platform that is deeply integrated into the Defender portal&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Sentinel data lake &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/microsoft-sentinel-data-lake-faq/4457728" target="_blank" rel="noopener" data-lia-auto-title="FAQ blog" data-lia-auto-title-active="0"&gt;FAQ blog&lt;/A&gt;&lt;BR /&gt;Get answers to many of the questions we’ve heard from our customers and partners on Sentinel data lake and billing&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=30e-LU-z5Xg" target="_blank" rel="noopener"&gt;AI‑powered SIEM migration experience ninja training&lt;/A&gt;&lt;BR /&gt;Walk through the SIEM migration experience, see how it maps detections, surfaces connector requirements, and supports phased migration decisions&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/en-us/azure/sentinel/siem-migration?tabs=splunk" target="_blank" rel="noopener"&gt;SIEM migration experience documentation&lt;/A&gt;&lt;BR /&gt;Learn how the SIEM migration experience analyzes your exports, maps detections and connectors, and recommends prioritized coverage&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://newsroom.accenture.com/news/2026/accenture-collaborates-with-microsoft-to-bring-agentic-security-and-business-resilience-to-the-front-lines-of-cyber-defense" target="_blank" rel="noopener"&gt;Accenture collaborates with Microsoft to bring agentic security and business resilience to the front lines of cyber defense&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;&lt;STRONG&gt;Stay connected&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;Check back each month for the latest innovations, updates, and events to ensure you’re getting the most out of Sentinel. We’ll see you in the next edition!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 17:54:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-rsac-2026/ba-p/4503971</guid>
      <dc:creator>spalani</dc:creator>
      <dc:date>2026-04-03T17:54:06Z</dc:date>
    </item>
    <item>
      <title>Microsoft Sentinel is now supported in Unified RBAC with row-level access</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-is-now-supported-in-unified-rbac-with-row/ba-p/4503121</link>
      <description>&lt;H4&gt;Enabling streamlined, granular, and scalable permissions&lt;/H4&gt;
&lt;P&gt;We’re excited to announce the Public Preview of Unified Role Based Access Control (URBAC) for Microsoft Sentinel, together with row-level access. This new capability, available in April, extends the Microsoft Defender Unified RBAC model to Sentinel, enabling streamlined, granular, and scalable permissions management across your security workloads. With the addition of row-level scoping, multiple teams can operate securely within a shared Sentinel environment while using consistent and reusable scope definitions across tables and experiences.&lt;/P&gt;
&lt;H4&gt;What’s new?&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;Unified RBAC for Sentinel &lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage in Defender portal&lt;/STRONG&gt;: Sentinel permissions can now be managed directly in the Microsoft Defender portal. Assignments can automatically include future data sources and workspaces as they’re added.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unified permissions model&lt;/STRONG&gt;: Manage user privileges for Sentinel and other Defender workloads in a single, consistent system.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Easy role migration&lt;/STRONG&gt;: Import existing roles and assignments from Azure Sentinel for easy migration.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;Sentinel Scoping&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Create and assign scope: &lt;/STRONG&gt;Scope can now be created from the permissions page and assigned to users or user groups across workspaces.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Tag data: &lt;/STRONG&gt;Scope tags can be applied to rows in tables, using ‘Table Management’, allowing you to create rules that tag newly ingested data automatically with the scope.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Access data&lt;/STRONG&gt;: Scoped users can manage alerts, incidents, and hunt over scoped data (including the lake), allowing them to see only the data within their own scope.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Common use-cases include accommodating multiple SOC teams within a shared environment (for example segregated by business unit, geography or discipline), providing access to teams outside of the SOC, or restricting sensitive data.&lt;/P&gt;
&lt;H4&gt;How does it work?&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;Sentinel in Unified RBAC&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1) Create a custom role&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Go to the Permissions page in Defender, and select &lt;STRONG&gt;Defender XDR&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Roles&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;You can also click &lt;STRONG&gt;Import roles&lt;/STRONG&gt; to re-create existing roles in URBAC automatically.&lt;/LI&gt;
&lt;LI&gt;In the Roles page, click &lt;STRONG&gt;Create a custom role&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a role name and description, and select the required permissions using this mapping:&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Sentinel Role&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Unified RBAC Permissions&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Microsoft Sentinel Reader&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security operations \ Security data basic (read)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Microsoft Sentinel Responder&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security operations \ Security data basic (read)&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security operations \ Alerts (manage)&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security operations \ Response (manage)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Microsoft Sentinel Contributor&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security operations \ Security data basic (read)&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security operations \ Alerts (manage)&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security operations \ Response (manage)&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorization and settings \ Detection tuning (manage)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Add assignment&lt;/STRONG&gt; and name the assignment.&lt;/LI&gt;
&lt;LI&gt;Select users and/or groups.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;Choose the Sentinel workspaces for the assignment.&lt;/LI&gt;
&lt;LI&gt;(Optional) &lt;STRONG&gt;Enable Include future data sources automatically&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Submit&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;2) Activate Unified RBAC for Sentinel&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Go back to the Roles page.&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Activate workloads&lt;/STRONG&gt; button in the top.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Manage workspaces&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select the desired workspaces to enable URBAC on.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Activate workspaces&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3) Edit, Delete, or Export Roles&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;To edit: Select the role, click &lt;STRONG&gt;Edit&lt;/STRONG&gt;, and update as needed.&lt;/LI&gt;
&lt;LI&gt;To delete: Select the role and click &lt;STRONG&gt;Delete&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;To export: Click &lt;STRONG&gt;Export&lt;/STRONG&gt; to download a CSV of roles, permissions, and assignments.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Prerequisites&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Access to the Microsoft Defender portal&lt;/STRONG&gt;: Ensure you can sign in at &lt;A href="https://security.microsoft.com/" target="_blank" rel="noopener"&gt;https://security.microsoft.com&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Global administrator, &lt;/STRONG&gt;combined with being a subscription owner OR combined with having user access administrator + Sentinel contributor role on the workspace.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel workspaces onboarded to Defender portal&lt;/STRONG&gt;: Sentinel workspaces must be available in the Defender portal before roles and permissions can be assigned.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Learn more&lt;/H4&gt;
&lt;P&gt;For more information, see &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/manage-rbac" target="_blank" rel="noopener"&gt;Microsoft Defender XDR Unified role-based access control (RBAC) - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;&lt;EM&gt;Sentinel Scoping&lt;/EM&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;1) Create &amp;amp; assign scope&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;First, we are going to create a scope tag that we will use to assign to users&lt;/LI&gt;
&lt;LI&gt;Navigate to the &lt;STRONG&gt;Permissions&lt;/STRONG&gt; page in the Defender portal&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Microsoft Defender XDR, &lt;/STRONG&gt;and then the &lt;STRONG&gt;Scopes &lt;/STRONG&gt;tab&lt;img /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Add Sentinel scope&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;On this screen, fill out a name for your scope, and optionally a description&lt;img /&gt;&lt;/LI&gt;
&lt;LI&gt;That’s it! Scope is created. You can create more scope tags if you like.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Next, we are going to assign this scope tag to users:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Go back to the Permissions page, this time to the &lt;STRONG&gt;Roles &lt;/STRONG&gt;tab.&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Create custom role&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Fill out the basics (role name, description).&lt;/LI&gt;
&lt;LI&gt;Next, assign permissions as appropriate.&lt;/LI&gt;
&lt;LI&gt;In the assignments screen, select the right users or user groups, the data. sources and data collections (Sentinel workspaces) as appropriate.&lt;/LI&gt;
&lt;LI&gt;Now, select the Sentinel scope &lt;STRONG&gt;Edit&lt;/STRONG&gt; button.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;Select the scopes (one or more) that you want to assign to this role.&lt;/LI&gt;
&lt;LI&gt;Once you are happy with all the settings, go ahead and submit to save the role.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;2) Tag tables with scope&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Now that we have created scope and assigned it to users, we are going to tag the tables from which these users should be allowed to see data.&lt;/LI&gt;
&lt;LI&gt;Navigate to the &lt;STRONG&gt;Tables&lt;/STRONG&gt; page under Microsoft Sentinel.&lt;/LI&gt;
&lt;LI&gt;Select the table you would like to assign scope to.&lt;/LI&gt;
&lt;LI&gt;Click the &lt;STRONG&gt;Scope tag rule&lt;/STRONG&gt; button.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;Enable scoping by clicking the toggle on &lt;STRONG&gt;Allow use of scope tags for RBAC&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Then, click the toggle under &lt;STRONG&gt;Scope tag rule&lt;/STRONG&gt; to enable your first rule.&lt;/LI&gt;
&lt;LI&gt;Add a KQL rule/expression which will specify which rows in this table should be tagged to the scope that you will attach. This will create a Data Collection Rule, and supports transformKQL supported operators and limits. Be aware of how to write expressions here: for example, to scope by location you can write: Location == 'Spain'.&lt;/LI&gt;
&lt;LI&gt;Then, select the scope tag that should be assigned to those rows.&lt;/LI&gt;
&lt;LI&gt;Once you are done, go ahead and click &lt;STRONG&gt;Save&lt;/STRONG&gt;. From now on, all data/each row that gets ingested into this table that meets the KQL rule/expression will be tagged with the scope tag that you’ve selected.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;3) Access data&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;a) Now that we’ve created scope, assigned it to users, and tagged the right data, we are ready to start using the scope.&lt;/P&gt;
&lt;P&gt;b) From now on, newly ingested data automatically gets tagged with scope. Historic (previously ingested) data is not included.&lt;/P&gt;
&lt;P&gt;c) You can add this scope to your detection rules by referencing the ‘SentinelScope_CF’ field.&lt;/P&gt;
&lt;P&gt;d) Alerts generated based on scoped data are now automatically tagged with the associated scope.&lt;/P&gt;
&lt;P&gt;e) Your scoped users can now access the different experiences where scoped data is visible, for example:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;f) View alerts that have resulted from data tagged with scope.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;g) View incidents that contain alerts with data tagged with scope.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;h) Run advanced hunting queries over the rows in the tables that the user is allowed to see.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;i) Run KQL queries over the Sentinel lake.&lt;/P&gt;
&lt;H4&gt;Prerequisites&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Access to the Microsoft Defender portal&lt;/STRONG&gt;: &lt;A href="https://security.microsoft.com/" target="_blank" rel="noopener"&gt;https://security.microsoft.com&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel workspaces onboarded to Defender portal&lt;/STRONG&gt;: Sentinel workspaces must be available in the Defender portal before roles and permissions can be assigned.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel in URBAC: &lt;/STRONG&gt;You must have enabled Sentinel in URBAC before using this feature.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Permissions &lt;/STRONG&gt;(for the person creating/assigning scope and tagging tables).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Security Authorization (Manage) permission &lt;/STRONG&gt;(URBAC)&lt;STRONG&gt;: &lt;/STRONG&gt;Allowing you to create scope and assignments.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Data Operations (Manage) permission &lt;/STRONG&gt;(URBAC)&lt;STRONG&gt;: &lt;/STRONG&gt;for Table Management.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Subscription owner &lt;/STRONG&gt;or assigned with the “Microsoft.Insights/DataCollectionRules/Write” permission.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;FAQ&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;What happens to legacy Sentinel roles after activating Unified RBAC?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;URBAC becomes the primary source of your permissions for Sentinel instead of Azure RBAC, so ensure the right permissions are set up on URBAC. Once URBAC is activated for a Sentinel workspace, continue to manage your permissions in URBAC.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;What about roles that are not yet supported?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;For example, the Automation Contributor role. You can assign these on Azure RBAC and they will continue to be respected.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Can I revert to managing Sentinel roles in Azure after enabling Unified RBAC?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, you can deactivate Unified RBAC for Sentinel in the Defender portal’s workload settings. This will revert to legacy Sentinel roles and their associated access controls.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Does Unified RBAC support both Sentinel Analytics and Lake workspaces?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, Unified RBAC supports both Sentinel Analytics and lake workspaces for consistent access management.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;What happens if an alert contains data outside of the user’s scope?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The scoped user can only see the data associated with their scope. If the alert contains entities/evidence that the user has no access to, they will not be able to see those. If the user has access to at least one of the associated entities, they can see the alert itself.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;What happens to incidents that contain multiple alerts?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The scoped user can see an incident if they have access to at least one of the underlying alerts. A scoped user can manage the incident if they have access to all of the underlying alerts and if they have the required permission. Unscoped users can see all alerts and incidents.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;What about other experiences; detection rules, playbooks, etc.?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A scoped user can only have read access to other resources/experiences for the moment, unless you create a separate assignment where you grant them elevated permissions. In the next few months, we will be introducing scoping for resources such as detection rules, automation rules, playbooks, etc.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Is Sentinel Scoping also applicable to the Sentinel lake?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, to any tables that support transformations (data collection rules).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Can I apply scope to a full table? What about previously ingested data?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You can create a KQL query that captures all fields in the table, which essentially creates ‘table level’ scope. Currently, it is not possible to grant access at full-table level (meaning, scoping previously ingested data).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Can I scope XDR tables?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Not currently. This includes XDR tables which received extended retention in the lake.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;If I ingest Defender data into Sentinel, is their scope (e.g. Device Groups, Cloud Scopes) maintained in Sentinel tables?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;No, if you ingest Defender data into Sentinel, that scoping is not propagated. Please keep this in mind when deciding how to apply scope to Sentinel tables.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Interested in learning more? Stay tuned for a webinar coming in April.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:25:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-is-now-supported-in-unified-rbac-with-row/ba-p/4503121</guid>
      <dc:creator>tomasbeerthuis</dc:creator>
      <dc:date>2026-03-31T20:25:27Z</dc:date>
    </item>
    <item>
      <title>Turning historical patterns into actionable detection pipelines with Microsoft Sentinel data lake</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/turning-historical-patterns-into-actionable-detection-pipelines/ba-p/4503126</link>
      <description>&lt;P&gt;This article is part of the&lt;STRONG&gt; Sentinel data lake practitioner series&lt;/STRONG&gt;. In &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/operationalizing-the-sentinel-data-lake-a-practitioner%E2%80%99s-guide/4466042" target="_blank" rel="noopener"&gt;part 1&lt;/A&gt;, we introduced the &lt;STRONG&gt;Operationalization Framework&lt;/STRONG&gt; — a structured way to turn exploratory notebooks into reliable, scheduled Spark jobs within the Microsoft Sentinel data lake.&lt;/P&gt;
&lt;P&gt;Now in &lt;STRONG&gt;Part 2&lt;/STRONG&gt;, we go from &lt;EM&gt;framework&lt;/EM&gt; to &lt;EM&gt;function&lt;/EM&gt; — showing how defenders can turn &lt;STRONG&gt;historical data into fresh, actionable insights&lt;/STRONG&gt; using modular pipelines built around one of the most persistent threats today: &lt;STRONG&gt;Password Spray attacks&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H4&gt;Why Password Spray Still Matters&lt;/H4&gt;
&lt;P&gt;Unlike brute-force attacks that hammer one account, password spray campaigns try &lt;STRONG&gt;a few passwords across many accounts&lt;/STRONG&gt;, often over days or weeks, to avoid lockouts.&lt;BR /&gt;Most detections look at short-term bursts — missing these &lt;EM&gt;low-and-slow&lt;/EM&gt; campaigns that quietly persist. As organizations scale billions of sign-in events per day, detection teams face an operational dilemma: how to retain long-term behavioral visibility without re-querying terabytes of raw telemetry.&lt;/P&gt;
&lt;P&gt;Attackers rotate IPs, leverage shared ASNs (Autonomous System Number), and reuse proxy networks. To detect such behavior, analysts need &lt;STRONG&gt;historical memory&lt;/STRONG&gt; — visibility into repeated patterns and attacker infrastructure.&lt;/P&gt;
&lt;H4&gt;Sentinel data lake notebooks for password spray&lt;/H4&gt;
&lt;P&gt;The new &lt;A href="https://github.com/microsoft/Sentinel/tree/main/data%20lake/notebooks/PasswordSpray" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Password Spray pipeline&lt;/STRONG&gt;&lt;/A&gt; is a suite of Spark notebooks that implements a&amp;nbsp;modular, cost-efficient pipeline&amp;nbsp;for detecting password spray attacks. &lt;BR /&gt;It transforms noisy authentication logs into structured behavioral features through three modular notebooks:&lt;/P&gt;
&lt;P&gt;Quick summary of what each notebook does and what it produces:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 91.5741%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Notebook&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Output Table&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;data_backfill_setup (optional)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Sets parameters and (optionally) backfills historical days for long-term context.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;signin_summary_daily_SPRK_CL&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;signin_stats_daily_SPRK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;signinlogs_summaryandstats_daily&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Aggregates raw sign-in logs into daily rollups and statistics.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;signin_summary_daily_SPRK_CL&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;signin_stats_daily_SPRK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;password_spray_features&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Computes behavioral features every 4 hours by comparing recent activity to historical days of history with lookback.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;password_spray_features_SPRK_CL&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Together, these notebooks separate &lt;STRONG&gt;daily summaries&lt;/STRONG&gt; (data lake layer) from &lt;STRONG&gt;feature computation&lt;/STRONG&gt; (analytics layer) minimizing cost while keeping analytics fresh.&lt;/P&gt;
&lt;H4&gt;High Level Architecture&lt;/H4&gt;
&lt;P&gt;Below is a high-level architecture for the Password Spray Detection Pipeline through a modular, scalable approach.&lt;/P&gt;
&lt;H3&gt;Key Components:&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Raw Data Ingestion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The pipeline starts with the ingestion of raw sign-in logs from the Sentinel data lake. Historical data is seeded using the &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;data_backfill_setup &lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;module, ensuring long-term behavioral visibility for detection. This is an optional step if you want to backfill historical days on the first run to compare with the fresh feature calculation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Daily Summarization&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;signinlogs_summaryandstats_daily&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt; notebook processes daily authentication events, creating summary tables and rollups. This separates the “data lake” layer (historical summaries) from the “analytics” layer (real-time analytics), optimizing cost and performance.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Feature Engineering&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;password_spray_features&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt; notebook runs every 4 hours, merging recent raw data (last 4 hours) with 30–90 days of pre-aggregated historical context generated from either daily summaries or ad-hoc backfill of historical day. It computes behavioral metrics such as total attempts, distinct users, success rate, entropy normalization, and a weighted spray score, labeling each run as LOW, MEDIUM, or HIGH risk. &amp;nbsp;This table can also be written to analytics tier if you want to create alerting workflow on top of this. If you continue to hunt based on notebooks, then you can keep it in the data lake tier.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Feature Outputs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Lastly results are written to feature tables that power downstream security operations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Alerts:&lt;/STRONG&gt; High-confidence incidents for risky IPs. This will require elevating results to analytics tier, so they are accessible via Advanced Hunting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Threat Hunts:&lt;/STRONG&gt; Investigations into recurring ASNs or geographic patterns.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Dashboards:&lt;/STRONG&gt; Identity-attack KPIs, heatmaps, and trends run against summary table, so you are not querying raw log table. For dashboarding, relevant summary tables need to be in analytics tier.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Analyst Views&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The architecture supports advanced analyst views, including investigations by ASN, IP, country, and city. Entropy metrics help correlate related IPs under shared cloud or proxy providers, enabling defenders to identify persistent attacker infrastructure and feed high-risk ASNs into blocklists or enrichment systems.&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;Inside the Feature Notebook – Detailed Breakdown&lt;/H4&gt;
&lt;P&gt;The &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;password_spray_features&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt; notebook transforms aggregated sign-in data into behavioral indicators that quantify the &lt;EM&gt;likelihood of password spray activity&lt;/EM&gt;.&lt;BR /&gt;Rather than relying on simple thresholds (e.g., “X failed logons per minute”), it computes &lt;STRONG&gt;multi-dimensional features&lt;/STRONG&gt; capturing attacker behavior over time.&lt;/P&gt;
&lt;H4&gt;Key Glossary Terms&lt;/H4&gt;
&lt;P&gt;Below is key glossary terms used throughout the section to describe the process.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;ASN&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;/STRONG&gt; Network Autonomous System Number; helps identify ISP or network owner.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Username entropy:&lt;/STRONG&gt; The Shannon entropy quantifies how evenly usernames are distributed within an IP’s attempt. E.g. &lt;EM&gt;&lt;U&gt;High entropy&lt;/U&gt;&lt;/EM&gt; – attacker spreading attempts broadly, &lt;EM&gt;&lt;U&gt;low entropy&lt;/U&gt;&lt;/EM&gt; – focused attempts (potential internal automations)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Normalization: &lt;/STRONG&gt;To ensure feature compatibility across scales, the values were normalized against max values derived globally. E.g. &lt;EM&gt;&lt;U&gt;distinct_users_norm = distinct_users/max(distinct_users)&lt;/U&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Spray score:&lt;/STRONG&gt; Composite weighted score combining distinct user count, entropy, and success rate.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Notes for Practitioners&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Entropy&lt;/STRONG&gt; helps reduce false positives — differentiating focused logon failures (legitimate user typos) from broad credential sprays.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Normalization&lt;/STRONG&gt; keeps scores stable — enabling comparisons across time ranges and environments.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Spray score risk label &lt;/STRONG&gt;tiers support alerting and downstream triage automation, allowing SOC teams to prioritize IPs with high potential impact.&lt;/LI&gt;
&lt;LI&gt;The daily summary and feature tables are reusable artifacts — can feed dashboards, threat hunts, UEBA models, or scheduled detections in Sentinel Analytics tier.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Data Input and Time Window&lt;/H4&gt;
&lt;P&gt;Each execution processes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Recent activity&lt;/STRONG&gt; (e.g., last 4 hours)&lt;/LI&gt;
&lt;LI&gt;Combined with a &lt;STRONG&gt;historical lookback window&lt;/STRONG&gt; (e.g., 30-90 days)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This creates a hybrid snapshot balancing &lt;EM&gt;recency&lt;/EM&gt; with &lt;EM&gt;historical persistence&lt;/EM&gt;, allowing slow-moving campaigns to stand out.&lt;/P&gt;
&lt;H4&gt;Feature Computation&lt;/H4&gt;
&lt;P&gt;Each IP address grouped by ASN, City, and Country is analyzed to extract behavioral metrics.&lt;/P&gt;
&lt;P&gt;Below is high level schema transformation diagram showing from raw logs to summary calculation and finally computing the features from recent time window- scheduled to run at defined frequency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;Spray Score Formula&lt;/H4&gt;
&lt;P&gt;The &lt;STRONG&gt;spray_score&lt;/STRONG&gt; combines normalized metrics and inverse success ratio to produce a single behavioral likelihood score.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Explanation:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;distinct_users_norm (50%) emphasizes spread of attack.&lt;/LI&gt;
&lt;LI&gt;(1 - success_rate) (20%) penalizes benign IPs with legitimate logons.&lt;/LI&gt;
&lt;LI&gt;entropy_norm (30%) captures randomness typical of distributed attacks.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Each component is &lt;STRONG&gt;rounded to two decimals&lt;/STRONG&gt; for readability and consistent scoring.&lt;/P&gt;
&lt;H4&gt;Risk Labelling&lt;/H4&gt;
&lt;P&gt;Since the score is normalized to 0-1, it can be bucketed into qualitative risk tiers.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Range&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Label&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Meaning&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;lt; 0.3&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;LOW&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Likely benign / low spread&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;0.3–0.6&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;MEDIUM&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Possible automated scanning or early spray&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;≥ 0.6&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;HIGH&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;High-confidence password spray behavior&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H4&gt;Output Schema&lt;/H4&gt;
&lt;P&gt;Each row in the resulting &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;password_spray_features_SPRK&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt; table represents a unique IP and its behavioral fingerprint for a given analysis&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Column&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;IPAddress&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Source IP address&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;ASN, City, Country&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Enrichment context&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;attempts_total, success_count, distinct_users, days_active&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Base metrics&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;username_entropy, distinct_users_norm, entropy_norm, success_rate&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Derived features&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;spray_score, spray_score_label&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Final behavioral score and label&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;detection_window_start, detection_window_end, run_date&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Window boundaries for reproducibility&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a visual depicting the &lt;STRONG&gt;flow of feature calculations&lt;/STRONG&gt; for the password spray detection notebook — from raw metrics → normalization → scoring → labeling — in a clean horizontal layout.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;Tracking Adversary Infrastructure&lt;/H4&gt;
&lt;P&gt;Including &lt;STRONG&gt;ASN, City, Country, and entropy metrics&lt;/STRONG&gt; allows defenders to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Correlate related IPs under shared cloud or proxy providers&lt;/LI&gt;
&lt;LI&gt;Identify &lt;EM&gt;persistent attacker infrastructure&lt;/EM&gt; across days or weeks&lt;/LI&gt;
&lt;LI&gt;Feed high-risk ASNs into TI blocklists or Defender XDR enrichment&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Call to Action: Operationalize in 30 minutes&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Deploy the three notebooks (backfill, daily summary, features) into your Sentinel data lake workspace using VSCode extension once you clone the repo locally.&lt;/LI&gt;
&lt;LI&gt;Run &lt;STRONG&gt;data_backfill_setup&lt;/STRONG&gt; once (optional) to seed 30–90 days of history.&lt;/LI&gt;
&lt;LI&gt;Schedule &lt;STRONG&gt;signinlogs_summaryandstats_daily&lt;/STRONG&gt; to run daily and write summary tables.&lt;/LI&gt;
&lt;LI&gt;Schedule &lt;STRONG&gt;password_spray_features&lt;/STRONG&gt; every 4 hours to produce &lt;STRONG&gt;password_spray_features_SPRK_CL&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Operationalize outputs: hunt in the feature table, dashboard on summaries, and (optionally) write high-risk results to Analytics tier for alert rules. Notebook has Recommended monitoring queries for hunting and analytics.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;Daily Spray Activity Summary&lt;/H4&gt;
&lt;P&gt;password_spray_features_SPRK_CL&lt;STRONG&gt;|&lt;/STRONG&gt; &lt;STRONG&gt;where&lt;/STRONG&gt; run_date &lt;STRONG&gt;&amp;gt;=&lt;/STRONG&gt; ago(7d)&lt;STRONG&gt;|&lt;/STRONG&gt; summarize &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;TotalSprayIPs &lt;STRONG&gt;=&lt;/STRONG&gt; dcount(IPAddress),&amp;nbsp;&amp;nbsp;&amp;nbsp; HighRiskIPs &lt;STRONG&gt;=&lt;/STRONG&gt; dcountif(IPAddress, spray_score_label &lt;STRONG&gt;==&lt;/STRONG&gt; "HIGH"),&amp;nbsp;&amp;nbsp;&amp;nbsp; TopCountries &lt;STRONG&gt;=&lt;/STRONG&gt; make_set(Country, 5)&lt;STRONG&gt;by&lt;/STRONG&gt; bin(run_date, 1d)&lt;/P&gt;
&lt;H4&gt;Persistent Threat Actors&lt;/H4&gt;
&lt;P&gt;password_spray_features_SPRK_CL&lt;STRONG&gt;|&lt;/STRONG&gt; &lt;STRONG&gt;where&lt;/STRONG&gt; spray_score_label &lt;STRONG&gt;in&lt;/STRONG&gt; ("HIGH", "MEDIUM")&lt;STRONG&gt;|&lt;/STRONG&gt; &lt;STRONG&gt;where&lt;/STRONG&gt; days_active &lt;STRONG&gt;&amp;gt;=&lt;/STRONG&gt; 3&amp;nbsp; &lt;STRONG&gt;//&lt;/STRONG&gt; Active &lt;STRONG&gt;for&lt;/STRONG&gt; multiple days&lt;STRONG&gt;|&lt;/STRONG&gt; top 20 &lt;STRONG&gt;by&lt;/STRONG&gt; spray_score &lt;STRONG&gt;desc&lt;/STRONG&gt;&lt;/P&gt;
&lt;H4&gt;Conclusion&lt;/H4&gt;
&lt;P&gt;Rather than focusing solely on short-lived spikes in telemetry, detections should incorporate historical context to identify persistent adversary behavior. For example, an attacker may attempt a small set of common passwords across many accounts each night while rotating IP addresses, thereby avoiding suspicion within any single 15‑minute window. By correlating low-volume activity over a 30–90 day lookback period, detections can attribute recurring infrastructure to a slow, sustained password-spray campaign and surface persistence—not just isolated activity.&lt;/P&gt;
&lt;P&gt;By turning Spark notebooks into modular, operational pipelines within Microsoft Sentinel data lake, we create a repeatable detection architecture — one that scales analytics, reduces costs, and integrates seamlessly into your broader SIEM ecosystem.&lt;/P&gt;
&lt;P&gt;As organizations shift from reactive to proactive detection engineering, the Sentinel data lake emerges as the foundation for next-generation behavioral analytics — where every authentication log record has a second life as a feature, a score, or an insight.&lt;/P&gt;
&lt;H3&gt;Resources&lt;/H3&gt;
&lt;P&gt;For more resources, see:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/notebook-jobs" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Notebook Jobs in Sentinel&lt;/STRONG&gt;&lt;/A&gt; - Learn to schedule and automate your notebooks&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-provider-class-reference" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Sentinel Provider Class Reference&lt;/STRONG&gt;&lt;/A&gt; - Complete API documentation for MicrosoftSentinelProvider&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://github.com/microsoft/Sentinel" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Sentinel data lake GitHub&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;- Out-of-the Box Notebooks and KQL queries for data lake.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/operationalizing-the-sentinel-data-lake-a-practitioner%E2%80%99s-guide/4466042" target="_blank" rel="noopener"&gt;Operationalizing the Sentinel data lake: A Practitioner’s Guide&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 18 Mar 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/turning-historical-patterns-into-actionable-detection-pipelines/ba-p/4503126</guid>
      <dc:creator>Ashwin_Patil</dc:creator>
      <dc:date>2026-03-18T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Microsoft partners with DataBahn to accelerate enterprise deployments for Microsoft Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-partners-with-databahn-to-accelerate-enterprise/ba-p/4501055</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Enterprise security teams are collecting more telemetry than ever across cloud platforms, endpoints, SaaS applications, and on-premises infrastructure. Security&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;teams want broader data coverage and longer retention without losing control of cost and data&amp;nbsp;quality.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This post explains the&amp;nbsp;new&amp;nbsp;DataBahn&amp;nbsp;integration with Microsoft Sentinel, why it matters for SIEM operations, and how to think about using a security data pipeline&amp;nbsp;alongside&amp;nbsp;Sentinel for onboarding, normalization, routing, and governance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;DataBahn&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;joins Microsoft Sentinel partner ecosystem&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This integration reflects Microsoft Sentinel’s open partner ecosystem, giving customers choice in&amp;nbsp;the partners they use alongside Microsoft&amp;nbsp;Sentinel&amp;nbsp;to&amp;nbsp;manage&amp;nbsp;their&amp;nbsp;security data pipelines.&amp;nbsp;DataBahn&amp;nbsp;joins a broader set of complementary partners, enabling customers to&amp;nbsp;tailor solutions&amp;nbsp;for their&amp;nbsp;unique&amp;nbsp;security data needs. DataBahn&amp;nbsp;is available through Microsoft Marketplace and is eligible for customers to apply existing Azure Consumption Commitments toward the purchase of&amp;nbsp;DataBahn.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Why this matters for security operations teams&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security teams are under relentless pressure to ingest more data, move faster through SIEM migrations, and preserve data fidelity for detections and investigations, all while&amp;nbsp;managing&amp;nbsp;costs effectively.&amp;nbsp;The challenge&amp;nbsp;isn’t&amp;nbsp;just ingesting data, but ensuring the right telemetry arrives in a consistent, governed format that analysts and detections can trust.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This is where a security data pipeline,&amp;nbsp;alongside Microsoft Sentinel’s native connectors and DCRs, can add value. It helps streamline onboarding of third-party and custom sources, improve normalization consistency, and provide operational visibility across diverse environments as deployments scale.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;What &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;DataBahn&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;integration is positioned to do with Microsoft Sentinel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:261,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security teams want broader coverage and need to ensure third-party data is consistently shaped, routed, and governed at scale.&amp;nbsp;This is where a security data pipeline like&amp;nbsp;DataBahn&amp;nbsp;complements Microsoft Sentinel. Sitting upstream of ingestion, the pipeline layer standardizes onboarding and shaping across sources while providing operational visibility into data flow and pipeline health. Together, the collaboration focuses on reducing onboarding friction, improving normalization consistency, enabling intentional routing, and strengthening governance signals so teams can quickly detect source changes, parser breaks, or data gaps—while staying aligned with Sentinel analytics and detection workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This model gives Sentinel customers more choice to move faster, onboard data at scale, and&amp;nbsp;retain&amp;nbsp;control over data routing.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Key capabilities&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Bidirectional data integration&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:40,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The integration enables seamless delivery of telemetry into Sentinel while aligning with Sentinel detection logic and schema expectations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;This helps ensure telemetry pipelines remain consistent with:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Sentinel detection formats&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Custom analytics rules&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Sentinel data models and schemas&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Automated table and DCR management&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&lt;SPAN data-contrast="none"&gt;As detections evolve, pipeline configurations can adapt to&amp;nbsp;maintain&amp;nbsp;detection&amp;nbsp;fidelity and data consistency.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Advanced management API&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:281,&amp;quot;335559739&amp;quot;:281}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;DataBahn&amp;nbsp;provides an advanced management API that allows organizations to programmatically configure and manage pipeline integrations with Sentinel.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;This enables teams to:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Automate pipeline configuration&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Manage operational workflows&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Integrate pipeline management into broader security or DevOps automation processes&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Automatic identification of configuration conflicts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:281,&amp;quot;335559739&amp;quot;:281}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In complex environments with multiple telemetry sources and routing rules, configuration conflicts&amp;nbsp;can arise across filtering logic, enrichment pipelines, and detection dependencies.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The integration helps automatically:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Detect conflicts in filtering rules and pipeline logic&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Identify&amp;nbsp;clashes with detection dependencies&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Highlight missing configurations or coverage gaps&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Automated detection of configuration conflicts and pipeline rule dependencies&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;This visibility allows SOC teams to quickly identify issues that could impact detection reliability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Centralized pipeline management&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:281,&amp;quot;335559739&amp;quot;:281}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The&amp;nbsp;integration enables centralized management of data collection and transformation&amp;nbsp;workflows associated with Sentinel telemetry pipelines.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;This provides unified visibility and control across telemetry sources while&amp;nbsp;maintaining&amp;nbsp;compatibility with Sentinel analytics and detections.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Centralized management simplifies operations across large environments where multiple telemetry pipelines must be&amp;nbsp;maintained.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Centralized pipeline management for telemetry sources across the environment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Flexible data transformation and customization&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:281,&amp;quot;335559739&amp;quot;:281}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Security telemetry often arrives in inconsistent formats across vendors and platforms.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The platform supports flexible transformation capabilities that allow organizations to:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Normalize logs into standard or custom Sentinel table formats&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Add or derive fields required by Sentinel detections&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Apply filtering or enrichment rules before ingestion&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Configuration can be performed through a single-screen workflow, enabling teams to&amp;nbsp;modify&amp;nbsp;schemas and define filtering logic without disrupting downstream analytics.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Flexible data transformation to align telemetry with Microsoft Sentinel ASIM schemas&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The platform also provides schema drift detection and source health monitoring, helping teams&amp;nbsp;maintain&amp;nbsp;reliable telemetry pipelines as environments evolve.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Closing&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:261,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Effective security operations depend on how quickly a SOC can onboard new data, scale effectively, and&amp;nbsp;maintain&amp;nbsp;high‑quality investigations. Sentinel provides a cloud‑native, AI-ready&amp;nbsp;foundation&amp;nbsp;to ingest security data from&amp;nbsp;first-&amp;nbsp;and third‑party&amp;nbsp;data sources—while enabling economical,&amp;nbsp;large‑scale retention and deep analytics using open&amp;nbsp;data&amp;nbsp;formats and multiple&amp;nbsp;analytics engines.&amp;nbsp;DataBahn’s&amp;nbsp;partnership with Sentinel&amp;nbsp;is positioned as a pipeline layer that can help teams onboard&amp;nbsp;third-party&amp;nbsp;sources, shape and normalize data, and apply routing and governance patterns before data lands in Sentinel.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Learn more&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://www.databahn.ai/databahn-for-microsoft-sentinel" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;DataBahn for Microsoft Sentinel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://www.databahn.ai/press-releases/databahn-deepens-partnership-with-microsoft" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;DataBahn Press Release - Databahn Deepens Partnership with Microsoft Sentinel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-lake-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Sentinel data lake overview - Microsoft Security | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Sentinel—AI-Ready Platform | Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/unified-secops/microsoft-sentinel-onboard" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Connect Microsoft Sentinel to the Microsoft Defender portal - Unified security operations | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/microsoft-sentinel-data-lake-is-now-generally-available/4456342" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Sentinel data lake is now generally available | Microsoft Community Hub&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 18 Mar 2026 16:40:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-partners-with-databahn-to-accelerate-enterprise/ba-p/4501055</guid>
      <dc:creator>JamesAde</dc:creator>
      <dc:date>2026-03-18T16:40:17Z</dc:date>
    </item>
    <item>
      <title>What’s New in Microsoft Sentinel: March 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-march-2026/ba-p/4499508</link>
      <description>&lt;P&gt;March brings a set of updates to Microsoft Sentinel focused on helping your SOC automate faster, onboard data with less friction, and detect threats across more of your environment.&lt;/P&gt;
&lt;P&gt;This month's updates include natural-language playbook generation for more flexible SOAR workflows, streamlined real-time data ingestion with CCF Push, and expanded Kubernetes visibility with a dedicated GKE connector. Together, these innovations help security teams simplify operations, move faster, and strengthen coverage without added complexity. And if you're heading to RSAC 2026, check out how to join us for Microsoft Pre-Day below.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;What’s new&lt;/STRONG&gt;&lt;/H2&gt;
&lt;H4&gt;&lt;STRONG&gt;Microsoft Sentinel playbook generator&lt;/STRONG&gt;&lt;STRONG&gt; brings natural-language automation to SOC workflows&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Microsoft Sentinel playbook generator lets you design and generate fully functional, code-based playbooks by describing what you need in natural language. Instead of relying on rigid templates and limited action libraries, you describe the workflow you want, and the generator produces a Python playbook with documentation and a visual flowchart. This has been a top ask from enterprise customers looking for more flexible automation in their SIEM workflows.&lt;/P&gt;
&lt;P&gt;The playbook generator works across Microsoft and third-party tools. By defining an Integration Profile with a base URL, authentication method, and credentials, it can create dynamic API calls without predefined connectors. That means you can automate tasks like team notifications, ticket updates, data enrichment, or incident response across your environment, then validate playbooks against real alerts and refine through chat or manual edits. You keep full transparency into the generated code and full control to customize it.&lt;/P&gt;
&lt;P&gt;Watch a &lt;A href="https://aka.ms/NLSOARDEMO" target="_blank" rel="noopener"&gt;demo&lt;/A&gt;&amp;nbsp;and &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/introducing-the-next-generation-of-soc-automation-sentinel-playbook-generator/4494438" target="_blank" rel="noopener"&gt;learn more&lt;/A&gt;. &amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;CCF Push&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;delivers seamless, real-time security data to Microsoft Sentinel&lt;/STRONG&gt;&lt;STRONG&gt; (public preview)&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Codeless Connector Framework (CCF) Push feature allows you to send security data directly to a Sentinel workspace in real time. Instead of configuring Data Collection Endpoints (DCE), Data Collection Rules (DCR), Entra app registrations, and RBAC assignments, you press "Deploy" and Sentinel sets up all the resources for you.&lt;/P&gt;
&lt;P&gt;Built on the Log Ingestion API, CCF Push supports high-throughput ingestion, data transformation before ingestion, and direct delivery to system tables to speed up SOC detection and response and to enable more flexible access to critical security telemetry. This opens pathways to advanced scenarios, including data lake integrations and agentic AI use cases.&lt;/P&gt;
&lt;P&gt;Sentinel solution developers can begin leveraging CCF Push immediately. Partners like Keeper Security, Obsidian Security, and Varonis are already using CCF Push to stream security data into Sentinel. &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/public-preview-announcement-empower-real-time-security-with-microsoft-sentinel%E2%80%99s/4483884" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt; and check out the &lt;A href="https://review.learn.microsoft.com/en-us/azure/sentinel/create-push-codeless-connector" target="_blank" rel="noopener"&gt;getting started guide&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Detect threats across GKE clusters in Microsoft Sentinel with a dedicated CCF connector (general availability)&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;A dedicated data connector for Google Kubernetes Engine (GKE) is available in the Microsoft Sentinel content hub, built on the Codeless Connector Framework (CCF). The connector ingests GKE cluster activity, workload behavior, and security events into the GKEAudit Log Analytics table, bringing GKE monitoring in line with how Azure Kubernetes Service (AKS) clusters are monitored in Sentinel today. It includes Data Collection Rule (DCR) support, data lake-only ingestion, and workspace transformation support so you can filter or modify incoming data before it reaches its destination.&lt;/P&gt;
&lt;P&gt;For security teams running workloads on GKE, this means you can apply Sentinel analytics, workbooks, and hunting queries across your GKE signals alongside the rest of your environment, giving you consistent visibility into Kubernetes threats whether your clusters run on Azure or Google Cloud. &lt;A href="https://marketplace.microsoft.com/en-us/product/azure-applications/azuresentinel.azure-sentinel-solution-gkelogs-api" target="_blank" rel="noopener"&gt;Get the GKE data connector&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Solve hybrid identity challenges with an RSA agent on Microsoft Sentinel data lake and Security Copilot&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;RSA has built an agentic solution that combines RSA ID Plus telemetry with Microsoft Sentinel's data lake and Security Copilot agents. The integration ingests administrative identity telemetry from &lt;A href="https://marketplace.microsoft.com/en-us/product/saas/rsasecurity1687281258544.id_plus_contactus?tab=overview" target="_blank" rel="noopener"&gt;RSA ID Plus&lt;/A&gt; into the Sentinel data lake for cost-effective, long-term retention, then uses Security Copilot agents to assess that data and surface anomalous or risky admin behavior automatically.&lt;/P&gt;
&lt;P&gt;For security teams managing complex hybrid identity environments, this means identity risk signals from RSA are analyzed alongside your broader Sentinel telemetry without manual correlation. Admin accounts remain one of the highest-value targets for attackers, and having agentic AI continuously assessing identity patterns helps your SOC detect compromised credentials earlier and reduce investigation time. &lt;A href="https://aka.ms/AppAssure_BehindtheBuild_RSA" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Join Microsoft Security at RSAC 2026 Pre-Day&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;If you are heading to RSAC™ 2026 in San Francisco, join Microsoft Security for Pre-Day on Sunday, March 22 at the Palace Hotel. Hear from Vasu Jakkal, CVP of Microsoft Security Business, and other Microsoft Security leaders on how AI and autonomous agents are reshaping defense strategy. Product leaders will share what they are focused on for security operations, threat intelligence experts will discuss emerging trends, and Microsoft researchers will highlight the newest areas of security R&amp;amp;D.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://microsoftsecurityevents.eventbuilder.com/events/11f08f85ec2008708c6a6f12d5785f8e?ref=blog_techcomm" target="_blank" rel="noopener"&gt;Register for Microsoft Pre-Day&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2026/02/12/your-complete-guide-to-microsoft-experiences-at-rsac-2026-conference/" target="_blank" rel="noopener"&gt;Explore all Microsoft experiences at RSAC 2026&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;Evaluate your SIEM platform for the agentic era with our strategic buyer's guide&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Our buyer’s guide from Microsoft Security helps security leaders evaluate what a modern SIEM platform should deliver. The Strategic SIEM Buyer's Guide walks through three essentials: building a unified foundation that is future-proof, accelerating detection and response with AI, and maximizing ROI with faster time to value. Whether you are assessing migration from a legacy on-premises SIEM or benchmarking your current platform, the guide offers practical buyer's tips and capability checklists grounded in real outcomes, including how organizations using Sentinel have achieved a 44% reduction in total cost of ownership and 93% faster deployment times. &lt;A href="https://msft.it/6042QrzlQ" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Sign up for upcoming events:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Mar 11: &lt;A href="https://msevents.microsoft.com/event?id=4223920713" target="_blank" rel="noopener"&gt;Microsoft Security Day (in-person, Mumbai)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Mar 18: &lt;A href="https://msevents.microsoft.com/event?id=3765462290" target="_blank" rel="noopener"&gt;Tech brief: Next‑Generation Security Operations with Microsoft&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Mar 19: &lt;A href="https://msevents.microsoft.com/event?id=4023418999" target="_blank" rel="noopener"&gt;Microsoft Security Immersion Event: Shadow Hunter (in-person, Toronto)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Mar 23-26: &lt;A href="https://microsoftsecurityevents.eventbuilder.com/RSACMicrosoftEvents26?ref=blog_RSACpreevent" target="_blank" rel="noopener"&gt;Microsoft Security at RSAC 2026 (in-person, San Francisco)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Mar 25: &lt;A href="https://msevents.microsoft.com/event?id=3628018800" target="_blank" rel="noopener"&gt;Microsoft Tech Brief: Modernize security operations with a unified platform&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Apr 2: &lt;A href="https://msevents.microsoft.com/event?id=1642390669" target="_blank" rel="noopener"&gt;Master SecOps in the AI Era: Kickstart Your SC-200 Certification Challenge&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Stay connected&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Check back each month for the latest innovations, updates, and events to ensure you’re getting the most out of Microsoft Sentinel. We’ll see you in the next edition!&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2026 20:21:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-march-2026/ba-p/4499508</guid>
      <dc:creator>NogaRonen</dc:creator>
      <dc:date>2026-03-04T20:21:05Z</dc:date>
    </item>
    <item>
      <title>Top 5 Microsoft Sentinel Queries for Threat Hunting</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/top-5-microsoft-sentinel-queries-for-threat-hunting/ba-p/4497667</link>
      <description>&lt;P&gt;Threat hunting in Microsoft Sentinel goes beyond relying on scheduled analytics rules. It’s about proactively asking better questions of your data to uncover stealthy or emerging attacker behavior before it turns into an incident. Effective hunting helps security teams spot activity that may never trigger an alert but still represents meaningful risk. Over time, these proactive hunts strengthen overall detection coverage and improve SOC maturity.&lt;/P&gt;
&lt;P&gt;In this post, I’ll walk through five high‑value Sentinel hunting queries that security teams can use to uncover suspicious activity across identity, endpoints, and cloud resources. Each example focuses on why the hunt matters and what attacker behavior it can reveal. To make these hunts actionable and measurable, each query is explicitly mapped to MITRE ATT&amp;amp;CK tactics and techniques. This alignment helps teams communicate coverage, prioritize investigations, and evolve successful hunts into repeatable detections.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;1. Rare Sign‑In Locations for Privileged Accounts&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Privileged identities are prime targets. A successful sign‑in from an unusual geography may indicate compromised credentials or token theft.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to hunt&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Look for successful sign‑ins by privileged users from locations they rarely use.&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;// MITRE ATT&amp;amp;CK: T1078 (Valid Accounts), T1078.004 (Cloud Accounts) | Tactic: Initial Access 
SigninLogs 
| where ResultType == 0 
| where UserPrincipalName has_any ("admin", "svc") 
| summarize count() by UserPrincipalName, Location 
| join kind=leftanti ( 
     SigninLogs 
     | where TimeGenerated &amp;lt; ago(30d) 
     | summarize count() by UserPrincipalName, Location 
) on UserPrincipalName, Location&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to investigate next&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Conditional Access policies applied&lt;/LI&gt;
&lt;LI&gt;MFA enforcement status&lt;/LI&gt;
&lt;LI&gt;Correlation with device compliance or impossible travel alerts&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;2. Multiple Failed Logons Followed by Success&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This pattern often indicates password spraying, brute force activity, or attackers testing credential validity before gaining access.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to hunt&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;// MITRE ATT&amp;amp;CK: T1110 (Brute Force), T1110.003 (Password Spraying), T1110.001 (Password Guessing) | Tactic: Credential Access 
// Related: T1078 (Valid Accounts) once authentication succeeds 
SigninLogs 
| summarize 
     Failed=countif(ResultType != 0), 
     Success=countif(ResultType == 0) 
     by UserPrincipalName, bin(TimeGenerated, 1h)  
| where Failed &amp;gt; 5 and Success &amp;gt; 0&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to investigate next&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;IP reputation and ASN&lt;/LI&gt;
&lt;LI&gt;Whether failures span multiple users (spray behavior)&lt;/LI&gt;
&lt;LI&gt;Subsequent mailbox, SharePoint, or Azure activity&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;3. Unusual Process Execution on Endpoints&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Attackers often use “living off the land” binaries (LOLBins) such as powershell.exe, wmic.exe, or rundll32.exe to evade detection.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to hunt&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;// MITRE ATT&amp;amp;CK: T1059 (Command and Scripting Interpreter), 
// T1059.001 (PowerShell), T1059.003 (Windows Command Shell) | Tactic: Execution 
// Related: T1218 (Signed Binary Proxy Execution) when rundll32 and other signed binaries are abused 
DeviceProcessEvents 
| where FileName in~ ("powershell.exe", "wmic.exe", "rundll32.exe") 
| where InitiatingProcessFileName !in~ ("explorer.exe", "services.exe") 
| project TimeGenerated, DeviceName, FileName, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to investigate next&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Encoded or obfuscated command lines&lt;/LI&gt;
&lt;LI&gt;Parent process legitimacy&lt;/LI&gt;
&lt;LI&gt;User context and device risk score&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;4. Newly Created or Modified Service Principals&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Service principals are often abused for persistence or privilege escalation in Azure environments.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to hunt&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;// MITRE ATT&amp;amp;CK: T1098 (Account Manipulation), T1098.001 (Additional Cloud Credentials) | Tactic: Persistence 
AuditLogs 
| where OperationName in ("Add service principal", "Update service principal") 
| project TimeGenerated, InitiatedBy, TargetResources, OperationName&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to investigate next&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Assigned API permissions or directory roles&lt;/LI&gt;
&lt;LI&gt;Token usage after creation&lt;/LI&gt;
&lt;LI&gt;Correlation with unfamiliar IP addresses&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;5. Rare Azure Resource Access Patterns&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Attackers exploring your environment often access subscriptions or resource groups they’ve never touched before.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to hunt&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;// MITRE ATT&amp;amp;CK: T1526 (Cloud Service Discovery), T1069.003 (Permission Groups Discovery: Cloud) | Tactic: Discovery 
AzureActivity 
| summarize count() by Caller, ResourceGroup 
| join kind=leftanti ( 
      AzureActivity | where TimeGenerated &amp;lt; ago(30d) 
      | summarize count() by Caller, ResourceGroup 
) on Caller, ResourceGroup&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to investigate next&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Role assignments for the caller&lt;/LI&gt;
&lt;LI&gt;Whether access aligns with job function&lt;/LI&gt;
&lt;LI&gt;Any subsequent configuration changes&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Summary Table&amp;nbsp;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This table summarizes each Sentinel threat hunting query and maps it directly to the corresponding MITRE ATT&amp;amp;CK tactic and technique. By aligning hunts to ATT&amp;amp;CK, security teams can clearly communicate what adversary behaviors are being proactively investigated and identify gaps in coverage. This mapping also makes it easier to prioritize hunts, measure maturity, and transition high‑value hunts into analytics rules over time.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Sentinel Hunt&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;MITRE Tactic&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;MITRE Technique&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Rare privileged sign‑ins&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Initial Access&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;T1078 – Valid Accounts&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Failed then successful logons&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Credential Access&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;T1110 – Brute Force&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;LOLBin execution&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Execution&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;T1059 / T1218&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Service principal changes&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Persistence&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;T1098.001&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Rare resource access&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Discovery&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;T1526 / T1069.003&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H3&gt;&lt;STRONG&gt;Final Thoughts&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Threat hunting in Microsoft Sentinel is most effective when it’s continuous, hypothesis‑driven, and contextual. These queries are starting points, not finished detections. Tune them based on your environment, enrich them with UEBA insights, and align your hunts to MITRE ATT&amp;amp;CK techniques, as outlined in your existing Sentinel content strategy.&lt;/P&gt;
&lt;P&gt;If you consistently run hunts like these, you’ll catch suspicious behavior before it triggers an alert or before an attacker reaches their objective.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 27 Feb 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/top-5-microsoft-sentinel-queries-for-threat-hunting/ba-p/4497667</guid>
      <dc:creator>SonjaEd</dc:creator>
      <dc:date>2026-02-27T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Unlocking value with Microsoft Sentinel data lake</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/unlocking-value-with-microsoft-sentinel-data-lake/ba-p/4497660</link>
      <description>&lt;P&gt;As security telemetry explodes and AI‑driven defense becomes the norm, it is critical to centralize and retain massive volumes of data for deep analysis and long‑term insights. Security teams are fundamentally rethinking how they manage, analyze, and act on security data.&lt;/P&gt;
&lt;P&gt;The &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel/?msockid=302788a71aaf677a36549fae1bf06650" target="_blank"&gt;Microsoft Sentinel data lake&lt;/A&gt; is a game changer for modern security operations, providing the foundation for agentic defense, deeper insights, and graph‑based enrichment. Security teams can centralize signals, simplify data management, and run advanced analytics, without compromising costs or performance.&lt;/P&gt;
&lt;P&gt;Across industries, organizations are using the Sentinel data lake to unify distributed data, search across years of telemetry, correlate sophisticated threats using graph-powered analytics, and operationalize agentic workflows at scale, turning raw security data into actionable intelligence.&amp;nbsp; In this blog we will highlight some of the ways Sentinel data lake is transforming modern security operations.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Unified, cost-effective security data foundation&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;STRONG&gt;The challenge&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Many organizations tell us they have been forced to make difficult tradeoffs: high ingestion costs meant selectively choosing which logs to keep, often leaving data that might have been critical during an investigation. This selective logging creates blind spots, fragmented visibility, and unnecessary operational complexity across security operations. As a result, CISOs increasingly view selective logging as a material security risk to their organizations.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;How Sentinel data lake helps&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-lake-overview" target="_blank"&gt;Sentinel data lake&lt;/A&gt; removes these constraints by providing a cost‑effective, security‑optimized foundation for centralizing large volumes of security data. With the data lake, security teams can finally retain the breadth of telemetry they need without the financial penalties traditionally associated with long‑term security data retention.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Organizations benefit from: &lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;A unified security data foundation designed to simplify investigations&lt;/LI&gt;
&lt;LI&gt;Long‑term, cost‑effective retention for up to 12 years&lt;/LI&gt;
&lt;LI&gt;Flexible querying across high‑volume data sets&lt;/LI&gt;
&lt;LI&gt;6x data compression in storage, enabling significantly lower retention costs at scale&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;By unifying data in a purpose-built security data lake, SOC teams gain reliable, comprehensive visibility without the budget limitations that once forced them to choose between cost and completeness. This stronger foundation not only improves day‑to‑day investigations; it unlocks the advanced analytics and AI‑powered capabilities that future proof SOCs for AI driven defense. With full visibility restored, organizations are better equipped to identify emerging threats, respond with confidence, and modernize their security operations on their own terms.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Historical security analysis&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;STRONG&gt;The challenge&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;SOC teams often struggle with short SIEM retention windows that limit how far back investigators can look. Critical logs age out before teams can fully piece together an attack, making root‑cause analysis slow and incomplete. This challenge grows when incidents span long periods, when new threat indicators emerge, or when organizations need to understand how a compromise evolved over time. Without access to historical telemetry, analysts face significant blind spots that weaken both investigations and hunting efforts.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;How Sentinel data lake helps&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The Sentinel data lake solves this by enabling organizations to retain and analyze years of security data at a fraction of the cost of traditional SIEM retention. Teams can use &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/kql-overview" target="_blank"&gt;KQL&lt;/A&gt; and &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/notebooks-overview" target="_blank"&gt;notebooks&lt;/A&gt; to run deep, long‑range investigations, perform advanced anomaly detection, and correlate older events that would have been impossible to recover in the analytics tier. &amp;nbsp;Historical data enables retro analysis when new threat intel emerges. SOC teams can instantly look back to validate whether newly discovered indicators, techniques, or threat actors were already present in their environment.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Organizations benefit from:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Years of cost‑effective retention that extend far beyond traditional SIEM windows&lt;/LI&gt;
&lt;LI&gt;Deep forensic investigations using KQL and notebooks over historical data&lt;/LI&gt;
&lt;LI&gt;Improved anomaly detection with long‑range patterns and baselines&lt;/LI&gt;
&lt;LI&gt;Faster scoping of incidents with access to full historical context&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;By unlocking access to years of searchable telemetry, SOC teams are no longer limited by short retention windows or forced to make compromises that weaken security. They can retrace the full scope of an incident, hunt for slow‑moving threats, and quickly respond to new IOCs, powered by the historical context modern attacks demand. This long‑range visibility strengthens both detection and response, giving organizations the confidence and continuity they need to stay ahead of evolving threats.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Graph-powered attack-path visibility and entity correlation&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;STRONG&gt;The challenge&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Traditional investigations often rely on reviewing logs in isolation, making it difficult to connect identity activity, endpoint behavior, cloud access, and threat intelligence in a meaningful way. As a result, SOC teams find it difficult to trace attack paths, understand lateral movement, and build complete investigative context. Without a unified view of how entities relate to each other, investigations become slow, fragmented, and are prone to missed signals.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;How &lt;/STRONG&gt;&lt;STRONG&gt;Sentinel data lake helps&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The Sentinel data lake enables powerful &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-graph-overview?tabs=defender" target="_blank"&gt;graph‑based correlation&lt;/A&gt; across identity, asset, activity, and threat intelligence data. Using graph models, analysts can visually explore how entities connect, identify hidden attack paths, pinpoint exposed routes to sensitive assets, and understand the full blast radius of compromised accounts or devices. This graph‑driven context turns complex telemetry into intuitive visuals that dramatically accelerate both pre‑breach context and incident response.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Organizations benefit from:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Graph‑powered correlation across identity, asset, activity, and threat intelligence data&lt;/LI&gt;
&lt;LI&gt;Visualization of attack paths and lateral movement that logs alone cannot expose&lt;/LI&gt;
&lt;LI&gt;Context‑rich investigations supported by relationship‑driven insights&lt;/LI&gt;
&lt;LI&gt;Greater cross‑domain visibility that strengthens both detection and response&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;With graph‑powered context, SOC teams move beyond event‑by‑event analysis and gain a deep understanding of how their environment behaves as a system. This visibility speeds investigations, strengthens posture before attackers strike, and provides analysts with a clear, intuitive way to uncover relationships that traditional log searches simply can’t reveal.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Agentic workflows powered by MCP server&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;STRONG&gt;The challenge&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;SOC teams are under constant pressure from rising alert volumes, repetitive manual investigative steps, and skill gaps that make consistent triage challenging. Even experienced analysts struggle to reason across large, distributed datasets, and junior analysts often lack the experience needed to understand complex threat scenarios. These challenges slow down response and increase the risk of missed signals.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;How the Sentinel data lake helps&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The Sentinel data lake, combined with the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-overview" target="_blank"&gt;Model Context Protocol (MCP)&lt;/A&gt;, enables AI agents to reason over unified, contextual security data using natural‑language prompts. Analysts can ask questions directly: “Does this user have other suspicious activity?” or “What assets are at risk?”, and agents automatically interpret the request, query the data lake, and return actionable insights. These AI‑powered workflows reduce repetitive effort, strengthen investigative consistency, and help teams operate at a higher level of speed and precision.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Organizations benefit from:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;AI‑assisted investigations that reduce manual effort and accelerate triage&lt;/LI&gt;
&lt;LI&gt;Agentic workflows powered by MCP to automate multi‑step reasoning over unified data&lt;/LI&gt;
&lt;LI&gt;Natural‑language interactions that make complex queries accessible to all analysts&lt;/LI&gt;
&lt;LI&gt;Consistent, high‑quality analysis regardless of analyst experience level&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Why it matters&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;By introducing agentic, AI‑driven workflows, SOC teams can automate time‑consuming tasks, reduce alert fatigue, and empower every analyst, regardless of seniority, to quickly arrive at high‑quality insights. This shift not only accelerates investigations but also frees teams to focus on high‑value, proactive security work. As organizations continue modernizing their SOC, agentic workflows represent a major step forward in bridging the gap between human expertise and scalable, AI‑powered analysis.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;The future of security operations starts here&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Sentinel data lake is becoming the backbone of modern security operations—unifying security data, expanding investigative reach, and enabling graph‑driven, AI‑powered analysis at scale. By centralizing telemetry on a cost‑effective, AI‑ready foundation, and running advanced analytics on that data, security teams can move beyond fragmented insights to correlate threats with clarity and act faster with confidence.&lt;/P&gt;
&lt;P&gt;These four use cases are just the beginning. Whether you’re strengthening investigations, advancing threat hunting, operationalizing AI, or preparing your SOC for what’s next, the Sentinel data lake provides the scale, intelligence, and flexibility to reduce complexity and stay ahead of evolving threats. Now is the time to accelerate toward a more resilient, adaptive, and future‑ready security posture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://aka.ms/Get_started/Sentinel_datalake" target="_blank" rel="noopener"&gt;Get started with Microsoft Sentinel data lake today&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 22:28:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/unlocking-value-with-microsoft-sentinel-data-lake/ba-p/4497660</guid>
      <dc:creator>atennant</dc:creator>
      <dc:date>2026-02-26T22:28:54Z</dc:date>
    </item>
  </channel>
</rss>

