Identify which MFA methods your users actually use.
| | A simple KQL query against Sign-in logs gives you visibility into the MFA methods users are actually using: [link] [comments] |
| | A simple KQL query against Sign-in logs gives you visibility into the MFA methods users are actually using: [link] [comments] |
| | This is a way to reduce noise before data hits your main analytics tier:
Why it matters:
One detail I like: with split, the data sent to Analytics is also mirrored to the Data lake, while non-matching data goes to Data lake only. That gives you a cleaner SOC experience without losing retention coverage. Also worth remembering:
This is a very practical feature for teams drowning in firewall, proxy, or other high-volume logs. Docs:https://learn.microsoft.com/en-us/azure/sentinel/transformation-filter-split [link] [comments] |
| | By default, Sentinel health monitoring is not enabled, which means you could be missing visibility into the platform’s own status. If you are still using Microsoft Sentinel in the Azure portal, make sure to verify whether monitoring is turned on. [1] Go to Azure portal -> Microsoft Sentinel -> Configuration | Settings -> Settings -> Auditing and Health monitoring If you have already moved to the Unified SecOps portal — which I highly recommend — you can review those settings there instead. [2] Go to Microsoft Defender portal -> System -> Settings -> Microsoft Sentinel -> select your Sentinel LaW Also, when you will have the data install "Microsoft Sentinel Optimization Workbook" solution to view insights of Sentinel
About workbook - Introducing Microsoft Sentinel Optimization Workbook | Microsoft Community Hub [link] [comments] |
| | What’s new? Why this matters in real SOC life Docs: Generate playbooks using AI in Microsoft Sentinel | Microsoft Learn In my opinion as example ChatGPT also does good vibe coding if we talk about Logic App/Playbook creation. [link] [comments] |
| | Classic alert-trigger automation in Microsoft Sentinel, where playbooks are assigned directly within analytic rules will retire on 15 March 2026. Required action:
[link] [comments] |
| | Regional outages shouldn’t stop your operations. By replicating your Log Analytics workspace across regions, you gain the ability to switch over manually to a secondary workspace and keep your monitoring running smoothly. Replication ensures: Plan ahead, monitor health, and decide when to switch for maximum resilience. Must have option, if you are using Microsoft Sentinel as your primary SIEM solution. Example: Price - €0.260 per GB (North Europe region example) [link] [comments] |
| | Has anyone noticed that when you're using the Basic table plan in Microsoft Sentinel, the Cost workbook doesn’t show the pricing correctly? It simply takes the amount of data in GB, multiplies it, and calls it a day. :D FYI: To see the actual cost, check Cost Management + Billing in the Azure Portal if you're on an Azure PAYG subscription. If you're using CSP, you’ll need to contact your partner to get a detailed report. EDIT (25.11.25): Ok, i created this query and added in workbook and visualized as Tiles. West Europe region. At least something.. :D adjust it and add your tables.. also created new parameter Basic Table plan price. At lease for CSP it is ok [link] [comments] |
Hey!
Maybe if someone is interested I'm sharing my personal blog first 2 parts related to Microsoft Sentinel and pricing Breakdown .
Idea is to deep dive in MS Sentinel cost, filtering, how data is corelated, also tips & trick for filtering.
I hope it will be useful for someone!
| | Microsoft Sentinel is rolling out a standardized account entity naming logic to improve consistency and reliability across incidents, alerts, and automation workflows. UPN -> Name -> Display name [link] [comments] |
| | Microsoft Sentinel’s UEBA now empowers SOC teams with even deeper, AI-driven anomaly detection—thanks to six new data sources! These additions help you spot threats faster by expanding behavioral visibility across Microsoft and multicloud environments. Microsoft authentication sources: 🔹Defender XDR device logon events: Detect lateral movement, unusual access, or compromised endpoints. 🔹Entra ID managed identity sign-in logs: Monitor automation/service account activity to catch silent misuse. 🔹Entra ID service principal sign-in logs: Track app/script sign-ins for unexpected access or privilege escalation. Third-party cloud & identity platforms: 🔹AWS CloudTrail login events: Flag risky AWS logins, failed MFA, or root account use. 🔹GCP audit logs – Failed IAM access: Identify denied access attempts and privilege escalation in Google Cloud. 🔹Okta MFA & authentication security changes: Surface MFA challenges and policy changes—potential signals of targeted attacks. 💡 To get to the Entity behavior configuration page:
[link] [comments] |
| | This update: ✅ Streamlines your workflow by removing the need to switch between portals ✅ Brings workbook management closer to the Azure experience ✅ Helps you visualize and monitor ingested data more efficiently 🔎 Why it matters:Microsoft Sentinel workbooks are built on Azure Monitor workbooks, giving you powerful visualization tools for your logs and queries. With tables, charts, and interactive analytics, they enhance your ability to monitor security data in real time. 📍 Where to find it:Defender portal → Microsoft Sentinel > Threat management > Workbook Read more:https://learn.microsoft.com/en-us/azure/sentinel/monitor-your-data?tabs=defender-portal [link] [comments] |
| | Microsoft has extended the migration timeline for the legacy ThreatIntelligenceIndicator table. 31 August 2025 → Ingestion into the legacy ThreatIntelligenceIndicator table stops. Historical data remains accessible, but no new data will be added. Update your workbooks, queries, and analytic rules to the new tables: 🔹 ThreatIntelIndicators 🔹 ThreatIntelObjects 31 August 2025 – 21 May 2026 → Optional dual ingestion (legacy + new) available only by service request. 21 May 2026 → Full retirement of the legacy table and ingestion. 💡 Action Required: Ensure all custom content references the new tables to avoid data gaps. If you need more time, request dual ingestion before August 2025. Table Talk: Sentinel’s New ThreatIntel Tables Explained | Microsoft Community Hub If currently you are ingesting TI from Microsoft, be sure to create Table transformation to not ingest "Data" table to reduce cost as it is not linked to any analytic rules. Also, check this article regarding TI ingestion optimization- Introducing Threat Intelligence Ingestion Rules | Microsoft Community Hub [link] [comments] |
| | On July 25, 2025 - Microsoft Entra ID Solution got an extremely useful update. Previously, obtaining insights into Conditional Access activities necessitated custom KQL queries or workbooks. With this latest update, we now have predefined detection rules for: ✅ Creation, modification, and deletion of CA policies, ✅ Detection of risky sign-in bypass attempts, ✅ Identification of privileged or break-glass account targeting, ✅ Monitoring changes in targeted groups. Visit the Content Hub, update the Microsoft Entra ID Solution, and enable new analytic rules based on your infrastructure needs. EDIT 03.09:Hi all, https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/ReleaseNotes.md [link] [comments] |