Microsoft Sentinel Documentation

Preview Microsoft Sentinel (formerly Azure Sentinel) is a cloud-native security information and event management (SIEM) solution that provides intelligent security analytics across your enterprise.

What is Microsoft Sentinel?

Sentinel helps you collect data at cloud scale—anywhere—from users, applications, servers, and devices running on-premises or in any cloud. It uses built‑in AI to reduce noise and integrates directly with Microsoft 365 Defender, Azure Defender, and third‑party solutions.

Key Features

Getting Started

Follow these steps to deploy Sentinel in your Azure subscription:

  1. Navigate to the Getting Started guide.
  2. Create a Log Analytics workspace if you don’t have one.
  3. Enable Microsoft Sentinel on the workspace.
  4. Add data connectors for the services you want to monitor.
  5. Deploy default analytics rules and configure alerts.

Resources

Sample KQL Query

Find failed sign‑in attempts from privileged accounts:

SecurityEvent
| where EventID == 4625
| where AccountType == "User"
| where AccountName endswith "$" == false
| where AccountDomain == "YOURDOMAIN"
| summarize Count = count() by AccountName, bin(TimeGenerated, 1h)
| order by Count desc

For more queries, see the Hunting Queries page.