Sentinel Review
Updated August 13, 2024
Sentinel Review

Score 9 out of 10
Vetted Review
Verified User
Overall Satisfaction with Microsoft Sentinel
Microsoft Sentinel is our SIEM that we use across three different environments. Our corporate environment, our commercial cloud environment, and our FedRAMP authorized government environment within the Azure gov portal. It is our primary source for all of the security related logs that we are collecting in order to actually do our jobs. And then we are also starting to expand using it for our SOAR capabilities as well. We were previously only using it as mostly a log source and searching, and then now we are also using the features for orchestration and response as well.
Pros
- I appreciate that it keeps the data within our, what we call our, authorization boundary. The fact that the data remains within Microsoft's, I guess, walled garden if you will, is very helpful for certain compliance needs in particular.
- The large library of ingestion: ability to ingest is basically as easy as I can basically get it to be most of the time. There's occasionally some vendors that it's a little bit more challenging for, but given the ease of integration for a lot of things, basically it's become one of my requirements when I am looking at other tools is how easily do they integrate with Sentinel.
Cons
- One of the struggles we definitely have is understandability. We have to have fairly strict security. We use role-based access control to manage that. Sometimes it's not clear what permissions we're missing so that when we actually need to go request those permissions or who we need to work with to actually do an action, it's a little challenging to figure out what do we actually need to ask for.
- Hugely positive impact. My team does not have to manage nearly as many things just to do our jobs. We can focus on the actual incident response work and while the cost savings have not been as big as we had hoped for, it has been much easier to control those or to see why is something causing, why are we generating so much extra data or where can we make risk informed decisions to either stop collecting data or change how we retain it.
There's a couple of different Microsoft services that we can use the Azure to Azure connectors where it's very easy to set up, including we actually have custom alerting that we do in Defender for endpoint because storing the data in Sentinel is a little bit too cost prohibitive to us. We also ingest information from, for instance, defender for alts, defender for cloud apps. There's a whole bunch of different things within the Microsoft Suite that are automatically ingested. We also ingest from Palo Alto firewalls. That has been less, I wish I didn't have to maintain a SIS log server for that, but that's not Microsoft's fault. That's partially on how Palo Alto integrates with that. And then the third one is we've got a couple of custom data sources that we needed to create ingestion functions for because the vendor did not support a way to get the data into Sentinel, one of which is Fastly Signal Sciences. And actually that is one of the reasons why I'm moving away from that product is because the integration has not been great.
That's been an easy thing to set up for us, easy to maintain.
Yes. So there's the custom alerts that are generated as part of the tool. I would love to actually pilot security copilot, it demoed well. I just have not gotten a chance to actually give it the focus that it needs, but this is an area of improvement that I want. I would like to take advantage of that. It's mostly the learning that goes into, there's new preview rules that are AI generated or AI augmented in some way, especially for things like Defender for Endpoint. We're just starting to explore a lot of those and it is basically a key part of my 2025 and beyond strategy on, I have to use this as a force multiplier because there's just no way we can keep up any other way.
Most of it ends up being on Endpoint, so using the tools within Defender for Endpoint, but those also integrate very well with Sentinel. We get some information for Defender for Identity. I'm expecting to get more from that now due to some changes we made with our Microsoft licensing. Previously we were limited by, we were using an E3 license now and we didn't have a bunch of the extra built-in products or the extra products that E5 gets you. Now we do. So I'm expecting to see more there in that space.
- Splunk Enterprise Security (ES) and Splunk Cloud
Prior to using Sentinel, we were using Splunk specifically Splunk Enterprise Security and Splunk Cloud, so their on-prem and their cloud-based products. We switched originally for cost reasons, specifically cost control, but I have found that the ability to create reports, the ability to integrate new data sources, et cetera, has been significantly better with Sentinel. With Splunk, it was a much bigger headache and it was harder for new people to ramp up than it is, than it actually has been with Sentinel itself.
Do you think Microsoft Sentinel delivers good value for the price?
Yes
Are you happy with Microsoft Sentinel's feature set?
Yes
Did Microsoft Sentinel live up to sales and marketing promises?
Yes
Did implementation of Microsoft Sentinel go as expected?
Yes
Would you buy Microsoft Sentinel again?
Yes
Microsoft Sentinel Feature Ratings
Using Microsoft Sentinel
15 - Incident response
- Detection of potential security events
- Automated response
Comments
Please log in to join the conversation