Skip to main content
TrustRadius
Microsoft Sentinel

Microsoft Sentinel
Formerly Azure Sentinel

Overview

What is Microsoft Sentinel?

Microsoft Sentinel (formerly Azure Sentinel) is designed as a birds-eye view across the enterprise. It is presented as a security information and event management (SIEM) solution for proactive threat detection, investigation, and response.

Read more
Recent Reviews
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 13 features
  • Centralized event and log data collection (14)
    8.6
    86%
  • Correlation (14)
    8.4
    84%
  • Event and log normalization/management (14)
    8.2
    82%
  • Custom dashboards and workspaces (14)
    7.4
    74%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Azure Sentinel

$2.46

Cloud
per GB ingested

100 GB per day

$123.00

Cloud
per day

200 GB per day

$221.40

Cloud
per day

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.microsoft.com/en…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Microsoft Sentinel: Monitoring health and integrity of analytics rules

YouTube
Return to navigation

Features

Security Information and Event Management (SIEM)

Security Information and Event Management is a category of security software that allows security analysts to look at a more comprehensive view of security logs and events than would be possible by looking at the log files of individual, point security tools

8.4
Avg 7.8
Return to navigation

Product Details

What is Microsoft Sentinel?

Microsoft Sentinel is a security operations center (SOC) solution used to uncover sophisticated threats and respond with a security information and event management (SIEM) solution for proactive threat detection, investigation, and response. It eliminates security infrastructure setup and maintenance, and elastically scales to meet the user's security needs.

Helps users to protect the digital estate: Secures the digital estate with scalable, integrated coverage for a hybrid, multicloud, multiplatform business.

Microsoft intelligence to Empower SOC: Optimizes SecOps with advanced AI, security expertise, and threat intelligence.

Detection, investigation and Response: A unified set of tools to monitor, manage, and respond to incidents.

Cost of ownership: A cloud-native SaaS solution to reduce infrastructural costs.

Microsoft Sentinel Features

Security Information and Event Management (SIEM) Features

  • Supported: Centralized event and log data collection
  • Supported: Correlation
  • Supported: Event and log normalization/management
  • Supported: Deployment flexibility
  • Supported: Integration with Identity and Access Management Tools
  • Supported: Custom dashboards and workspaces
  • Supported: Host and network-based intrusion detection
  • Supported: Log retention
  • Supported: Data integration/API management
  • Supported: Behavioral analytics and baselining
  • Supported: Rules-based and algorithmic detection thresholds
  • Supported: Response orchestration and automation
  • Supported: Incident indexing/searching

Microsoft Sentinel Screenshots

Screenshot of Screenshot of Screenshot of Microsoft Sentinel Capabilities

Microsoft Sentinel Videos

Playlist for Microsoft Sentinel videos
Microsoft Sentinel: Monitoring health and integrity of analytics rules

Microsoft Sentinel Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Microsoft Sentinel (formerly Azure Sentinel) is designed as a birds-eye view across the enterprise. It is presented as a security information and event management (SIEM) solution for proactive threat detection, investigation, and response.

Reviewers rate Deployment flexibility highest, with a score of 9.2.

The most common users of Microsoft Sentinel are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(68)

Attribute Ratings

Reviews

(1-22 of 22)
Companies can't remove reviews or game the system. Here's why
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (10)
52%
5.2
Centralized event and log data collection
60%
6.0
Correlation
50%
5.0
Event and log normalization/management
70%
7.0
Deployment flexibility
60%
6.0
Integration with Identity and Access Management Tools
60%
6.0
Custom dashboards and workspaces
50%
5.0
Log retention
40%
4.0
Behavioral analytics and baselining
50%
5.0
Rules-based and algorithmic detection thresholds
50%
5.0
Incident indexing/searching
30%
3.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
80%
8.0
Centralized event and log data collection
80%
8.0
Correlation
70%
7.0
Event and log normalization/management
80%
8.0
Deployment flexibility
80%
8.0
Integration with Identity and Access Management Tools
90%
9.0
Custom dashboards and workspaces
90%
9.0
Host and network-based intrusion detection
80%
8.0
Log retention
80%
8.0
Data integration/API management
70%
7.0
Behavioral analytics and baselining
80%
8.0
Rules-based and algorithmic detection thresholds
80%
8.0
Response orchestration and automation
80%
8.0
Incident indexing/searching
80%
8.0
November 13, 2023

SIEM means Sentinel

Yash Mudaliar | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
80.76923076923077%
8.1
Centralized event and log data collection
90%
9.0
Correlation
80%
8.0
Event and log normalization/management
80%
8.0
Deployment flexibility
100%
10.0
Integration with Identity and Access Management Tools
90%
9.0
Custom dashboards and workspaces
70%
7.0
Host and network-based intrusion detection
60%
6.0
Log retention
60%
6.0
Data integration/API management
70%
7.0
Behavioral analytics and baselining
80%
8.0
Rules-based and algorithmic detection thresholds
90%
9.0
Response orchestration and automation
90%
9.0
Incident indexing/searching
90%
9.0
Rogier Dijkman | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
76.15384615384615%
7.6
Centralized event and log data collection
100%
10.0
Correlation
100%
10.0
Event and log normalization/management
70%
7.0
Deployment flexibility
80%
8.0
Integration with Identity and Access Management Tools
80%
8.0
Custom dashboards and workspaces
80%
8.0
Host and network-based intrusion detection
N/A
N/A
Log retention
100%
10.0
Data integration/API management
80%
8.0
Behavioral analytics and baselining
N/A
N/A
Rules-based and algorithmic detection thresholds
100%
10.0
Response orchestration and automation
100%
10.0
Incident indexing/searching
100%
10.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
76.92307692307692%
7.7
Centralized event and log data collection
80%
8.0
Correlation
70%
7.0
Event and log normalization/management
60%
6.0
Deployment flexibility
100%
10.0
Integration with Identity and Access Management Tools
70%
7.0
Custom dashboards and workspaces
50%
5.0
Host and network-based intrusion detection
80%
8.0
Log retention
80%
8.0
Data integration/API management
80%
8.0
Behavioral analytics and baselining
70%
7.0
Rules-based and algorithmic detection thresholds
90%
9.0
Response orchestration and automation
100%
10.0
Incident indexing/searching
70%
7.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
71.53846153846155%
7.2
Centralized event and log data collection
80%
8.0
Correlation
80%
8.0
Event and log normalization/management
60%
6.0
Deployment flexibility
50%
5.0
Integration with Identity and Access Management Tools
80%
8.0
Custom dashboards and workspaces
80%
8.0
Host and network-based intrusion detection
50%
5.0
Log retention
70%
7.0
Data integration/API management
80%
8.0
Behavioral analytics and baselining
80%
8.0
Rules-based and algorithmic detection thresholds
70%
7.0
Response orchestration and automation
60%
6.0
Incident indexing/searching
90%
9.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
80.76923076923077%
8.1
Centralized event and log data collection
80%
8.0
Correlation
70%
7.0
Event and log normalization/management
80%
8.0
Deployment flexibility
90%
9.0
Integration with Identity and Access Management Tools
80%
8.0
Custom dashboards and workspaces
90%
9.0
Host and network-based intrusion detection
80%
8.0
Log retention
80%
8.0
Data integration/API management
80%
8.0
Behavioral analytics and baselining
80%
8.0
Rules-based and algorithmic detection thresholds
70%
7.0
Response orchestration and automation
80%
8.0
Incident indexing/searching
90%
9.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
77.6923076923077%
7.8
Centralized event and log data collection
80%
8.0
Correlation
80%
8.0
Event and log normalization/management
70%
7.0
Deployment flexibility
70%
7.0
Integration with Identity and Access Management Tools
70%
7.0
Custom dashboards and workspaces
80%
8.0
Host and network-based intrusion detection
80%
8.0
Log retention
70%
7.0
Data integration/API management
80%
8.0
Behavioral analytics and baselining
80%
8.0
Rules-based and algorithmic detection thresholds
80%
8.0
Response orchestration and automation
90%
9.0
Incident indexing/searching
80%
8.0
Namandeep Bhatia | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (9)
73.33333333333333%
7.3
Centralized event and log data collection
80%
8.0
Correlation
70%
7.0
Event and log normalization/management
70%
7.0
Custom dashboards and workspaces
80%
8.0
Host and network-based intrusion detection
70%
7.0
Log retention
70%
7.0
Data integration/API management
70%
7.0
Response orchestration and automation
80%
8.0
Incident indexing/searching
70%
7.0
Glenn H. Miller | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
85.38461538461539%
8.5
Centralized event and log data collection
90%
9.0
Correlation
80%
8.0
Event and log normalization/management
90%
9.0
Deployment flexibility
90%
9.0
Integration with Identity and Access Management Tools
80%
8.0
Custom dashboards and workspaces
80%
8.0
Host and network-based intrusion detection
90%
9.0
Log retention
80%
8.0
Data integration/API management
90%
9.0
Behavioral analytics and baselining
90%
9.0
Rules-based and algorithmic detection thresholds
80%
8.0
Response orchestration and automation
80%
8.0
Incident indexing/searching
90%
9.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
84.61538461538461%
8.5
Centralized event and log data collection
80%
8.0
Correlation
100%
10.0
Event and log normalization/management
80%
8.0
Deployment flexibility
90%
9.0
Integration with Identity and Access Management Tools
80%
8.0
Custom dashboards and workspaces
60%
6.0
Host and network-based intrusion detection
70%
7.0
Log retention
90%
9.0
Data integration/API management
90%
9.0
Behavioral analytics and baselining
100%
10.0
Rules-based and algorithmic detection thresholds
90%
9.0
Response orchestration and automation
80%
8.0
Incident indexing/searching
90%
9.0
September 13, 2023

Microsoft Sentinel Review

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
N/A
N/A
Centralized event and log data collection
N/A
N/A
Correlation
N/A
N/A
Event and log normalization/management
N/A
N/A
Deployment flexibility
N/A
N/A
Integration with Identity and Access Management Tools
N/A
N/A
Custom dashboards and workspaces
N/A
N/A
Host and network-based intrusion detection
N/A
N/A
Log retention
N/A
N/A
Data integration/API management
N/A
N/A
Behavioral analytics and baselining
N/A
N/A
Rules-based and algorithmic detection thresholds
N/A
N/A
Response orchestration and automation
N/A
N/A
Incident indexing/searching
N/A
N/A
September 13, 2023

Microsoft Sentinel Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
N/A
N/A
Centralized event and log data collection
N/A
N/A
Correlation
N/A
N/A
Event and log normalization/management
N/A
N/A
Deployment flexibility
N/A
N/A
Integration with Identity and Access Management Tools
N/A
N/A
Custom dashboards and workspaces
N/A
N/A
Host and network-based intrusion detection
N/A
N/A
Log retention
N/A
N/A
Data integration/API management
N/A
N/A
Behavioral analytics and baselining
N/A
N/A
Rules-based and algorithmic detection thresholds
N/A
N/A
Response orchestration and automation
N/A
N/A
Incident indexing/searching
N/A
N/A
September 13, 2023

Microsoft Sentinel Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
N/A
N/A
Centralized event and log data collection
N/A
N/A
Correlation
N/A
N/A
Event and log normalization/management
N/A
N/A
Deployment flexibility
N/A
N/A
Integration with Identity and Access Management Tools
N/A
N/A
Custom dashboards and workspaces
N/A
N/A
Host and network-based intrusion detection
N/A
N/A
Log retention
N/A
N/A
Data integration/API management
N/A
N/A
Behavioral analytics and baselining
N/A
N/A
Rules-based and algorithmic detection thresholds
N/A
N/A
Response orchestration and automation
N/A
N/A
Incident indexing/searching
N/A
N/A
September 13, 2023

Microsoft Sentinel Review

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
N/A
N/A
Centralized event and log data collection
N/A
N/A
Correlation
N/A
N/A
Event and log normalization/management
N/A
N/A
Deployment flexibility
N/A
N/A
Integration with Identity and Access Management Tools
N/A
N/A
Custom dashboards and workspaces
N/A
N/A
Host and network-based intrusion detection
N/A
N/A
Log retention
N/A
N/A
Data integration/API management
N/A
N/A
Behavioral analytics and baselining
N/A
N/A
Rules-based and algorithmic detection thresholds
N/A
N/A
Response orchestration and automation
N/A
N/A
Incident indexing/searching
N/A
N/A
September 12, 2023

Microsoft Sentinel

Score 8 out of 10
Vetted Review
ResellerIncentivized
Security Information and Event Management (SIEM) (13)
N/A
N/A
Centralized event and log data collection
N/A
N/A
Correlation
N/A
N/A
Event and log normalization/management
N/A
N/A
Deployment flexibility
N/A
N/A
Integration with Identity and Access Management Tools
N/A
N/A
Custom dashboards and workspaces
N/A
N/A
Host and network-based intrusion detection
N/A
N/A
Log retention
N/A
N/A
Data integration/API management
N/A
N/A
Behavioral analytics and baselining
N/A
N/A
Rules-based and algorithmic detection thresholds
N/A
N/A
Response orchestration and automation
N/A
N/A
Incident indexing/searching
N/A
N/A
September 12, 2023

Microsoft Sentinel Review

Score 9 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
N/A
N/A
Centralized event and log data collection
N/A
N/A
Correlation
N/A
N/A
Event and log normalization/management
N/A
N/A
Deployment flexibility
N/A
N/A
Integration with Identity and Access Management Tools
N/A
N/A
Custom dashboards and workspaces
N/A
N/A
Host and network-based intrusion detection
N/A
N/A
Log retention
N/A
N/A
Data integration/API management
N/A
N/A
Behavioral analytics and baselining
N/A
N/A
Rules-based and algorithmic detection thresholds
N/A
N/A
Response orchestration and automation
N/A
N/A
Incident indexing/searching
N/A
N/A
September 12, 2023

Microsoft Sentinel Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (13)
N/A
N/A
Centralized event and log data collection
N/A
N/A
Correlation
N/A
N/A
Event and log normalization/management
N/A
N/A
Deployment flexibility
N/A
N/A
Integration with Identity and Access Management Tools
N/A
N/A
Custom dashboards and workspaces
N/A
N/A
Host and network-based intrusion detection
N/A
N/A
Log retention
N/A
N/A
Data integration/API management
N/A
N/A
Behavioral analytics and baselining
N/A
N/A
Rules-based and algorithmic detection thresholds
N/A
N/A
Response orchestration and automation
N/A
N/A
Incident indexing/searching
N/A
N/A
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (14)
87.14285714285714%
8.7
Centralized event and log data collection
90%
9.0
Correlation
90%
9.0
Event and log normalization/management
90%
9.0
Deployment flexibility
90%
9.0
Integration with Identity and Access Management Tools
90%
9.0
Custom dashboards and workspaces
80%
8.0
Host and network-based intrusion detection
90%
9.0
Log retention
80%
8.0
Data integration/API management
90%
9.0
Behavioral analytics and baselining
80%
8.0
Rules-based and algorithmic detection thresholds
80%
8.0
Response orchestration and automation
90%
9.0
Reporting and compliance management
90%
9.0
Incident indexing/searching
90%
9.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (14)
88.57142857142858%
8.9
Centralized event and log data collection
100%
10.0
Correlation
100%
10.0
Event and log normalization/management
90%
9.0
Deployment flexibility
60%
6.0
Integration with Identity and Access Management Tools
100%
10.0
Custom dashboards and workspaces
80%
8.0
Host and network-based intrusion detection
80%
8.0
Log retention
90%
9.0
Data integration/API management
90%
9.0
Behavioral analytics and baselining
90%
9.0
Rules-based and algorithmic detection thresholds
90%
9.0
Response orchestration and automation
90%
9.0
Reporting and compliance management
90%
9.0
Incident indexing/searching
90%
9.0
Flavio Pereira | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (14)
96.42857142857142%
9.6
Centralized event and log data collection
100%
10.0
Correlation
90%
9.0
Event and log normalization/management
100%
10.0
Deployment flexibility
100%
10.0
Integration with Identity and Access Management Tools
90%
9.0
Custom dashboards and workspaces
100%
10.0
Host and network-based intrusion detection
100%
10.0
Log retention
90%
9.0
Data integration/API management
100%
10.0
Behavioral analytics and baselining
90%
9.0
Rules-based and algorithmic detection thresholds
100%
10.0
Response orchestration and automation
100%
10.0
Reporting and compliance management
100%
10.0
Incident indexing/searching
90%
9.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Security Information and Event Management (SIEM) (14)
97.85714285714286%
9.8
Centralized event and log data collection
100%
10.0
Correlation
90%
9.0
Event and log normalization/management
100%
10.0
Deployment flexibility
90%
9.0
Integration with Identity and Access Management Tools
100%
10.0
Custom dashboards and workspaces
100%
10.0
Host and network-based intrusion detection
90%
9.0
Log retention
100%
10.0
Data integration/API management
100%
10.0
Behavioral analytics and baselining
100%
10.0
Rules-based and algorithmic detection thresholds
100%
10.0
Response orchestration and automation
100%
10.0
Reporting and compliance management
100%
10.0
Incident indexing/searching
100%
10.0
Return to navigation