Sentinel Review
Updated August 13, 2024

Sentinel Review

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Microsoft Sentinel

Microsoft Sentinel is our SIEM that we use across three different environments. Our corporate environment, our commercial cloud environment, and our FedRAMP authorized government environment within the Azure gov portal. It is our primary source for all of the security related logs that we are collecting in order to actually do our jobs. And then we are also starting to expand using it for our SOAR capabilities as well. We were previously only using it as mostly a log source and searching, and then now we are also using the features for orchestration and response as well.

Pros

  • I appreciate that it keeps the data within our, what we call our, authorization boundary. The fact that the data remains within Microsoft's, I guess, walled garden if you will, is very helpful for certain compliance needs in particular.
  • The large library of ingestion: ability to ingest is basically as easy as I can basically get it to be most of the time. There's occasionally some vendors that it's a little bit more challenging for, but given the ease of integration for a lot of things, basically it's become one of my requirements when I am looking at other tools is how easily do they integrate with Sentinel.

Cons

  • One of the struggles we definitely have is understandability. We have to have fairly strict security. We use role-based access control to manage that. Sometimes it's not clear what permissions we're missing so that when we actually need to go request those permissions or who we need to work with to actually do an action, it's a little challenging to figure out what do we actually need to ask for.
  • Hugely positive impact. My team does not have to manage nearly as many things just to do our jobs. We can focus on the actual incident response work and while the cost savings have not been as big as we had hoped for, it has been much easier to control those or to see why is something causing, why are we generating so much extra data or where can we make risk informed decisions to either stop collecting data or change how we retain it.
There's a couple of different Microsoft services that we can use the Azure to Azure connectors where it's very easy to set up, including we actually have custom alerting that we do in Defender for endpoint because storing the data in Sentinel is a little bit too cost prohibitive to us. We also ingest information from, for instance, defender for alts, defender for cloud apps. There's a whole bunch of different things within the Microsoft Suite that are automatically ingested. We also ingest from Palo Alto firewalls. That has been less, I wish I didn't have to maintain a SIS log server for that, but that's not Microsoft's fault. That's partially on how Palo Alto integrates with that. And then the third one is we've got a couple of custom data sources that we needed to create ingestion functions for because the vendor did not support a way to get the data into Sentinel, one of which is Fastly Signal Sciences. And actually that is one of the reasons why I'm moving away from that product is because the integration has not been great.
That's been an easy thing to set up for us, easy to maintain.
Yes. So there's the custom alerts that are generated as part of the tool. I would love to actually pilot security copilot, it demoed well. I just have not gotten a chance to actually give it the focus that it needs, but this is an area of improvement that I want. I would like to take advantage of that. It's mostly the learning that goes into, there's new preview rules that are AI generated or AI augmented in some way, especially for things like Defender for Endpoint. We're just starting to explore a lot of those and it is basically a key part of my 2025 and beyond strategy on, I have to use this as a force multiplier because there's just no way we can keep up any other way.
Most of it ends up being on Endpoint, so using the tools within Defender for Endpoint, but those also integrate very well with Sentinel. We get some information for Defender for Identity. I'm expecting to get more from that now due to some changes we made with our Microsoft licensing. Previously we were limited by, we were using an E3 license now and we didn't have a bunch of the extra built-in products or the extra products that E5 gets you. Now we do. So I'm expecting to see more there in that space.
Prior to using Sentinel, we were using Splunk specifically Splunk Enterprise Security and Splunk Cloud, so their on-prem and their cloud-based products. We switched originally for cost reasons, specifically cost control, but I have found that the ability to create reports, the ability to integrate new data sources, et cetera, has been significantly better with Sentinel. With Splunk, it was a much bigger headache and it was harder for new people to ramp up than it is, than it actually has been with Sentinel itself.

Do you think Microsoft Sentinel delivers good value for the price?

Yes

Are you happy with Microsoft Sentinel's feature set?

Yes

Did Microsoft Sentinel live up to sales and marketing promises?

Yes

Did implementation of Microsoft Sentinel go as expected?

Yes

Would you buy Microsoft Sentinel again?

Yes

I'll go with where it's very suited in certain industries, including ours where the data resides or where it's being sent is incredibly important. So because the data stays within Microsoft World Garden, we are able to piggyback off of a lot of those certifications and meet certain requirements that allow us to expand where we sell our product to outside of scopes that we couldn't reach ourselves.

Microsoft Sentinel Feature Ratings

Centralized event and log data collection
Not Rated
Correlation
Not Rated
Event and log normalization/management
Not Rated
Deployment flexibility
Not Rated
Integration with Identity and Access Management Tools
Not Rated
Custom dashboards and workspaces
Not Rated
Host and network-based intrusion detection
Not Rated
Log retention
Not Rated
Data integration/API management
Not Rated
Behavioral analytics and baselining
Not Rated
Rules-based and algorithmic detection thresholds
Not Rated
Response orchestration and automation
Not Rated
Incident indexing/searching
Not Rated

Using Microsoft Sentinel

15 - Incident response
  • Detection of potential security events
  • Automated response

Comments

More Reviews of Microsoft Sentinel