Microsoft Sentinel Review
May 10, 2024

Microsoft Sentinel Review

Anonymous | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Microsoft Sentinel

Microsoft Sentinel is used by our cyber security team to monitor log and alert for Azure related alarms. Microsoft Sentinel is used daily by the cyber security analyst to review suspicious activity. Microsoft Sentinel is also used to monitor activity from non-full-time employees such as contractors as well.
  • Office 365 Alerting
  • Entra Alerting
  • Suspicious FW activity
  • More integration for other systems
  • Not easy to provide alerting telemetry
  • Not clear for FW alerts
  • If money was not issue, we would most likely go with a different tool
We use Microsoft Sentinel to collect logs from all of our Azure instances. It’s also used for firewall and network application web logs. It is also utilized for all office 365 logs. And behavioral logs.
Not very clear or easy.
We currently don’t use this feature.
I feel this is the weakest part of Microsoft Sentinel. The investigation tools are not ready for prime time.
The SecureWorks product is a more mature product. We prefer the SecureWorks product over Microsoft Sentinel at this point.

Do you think Microsoft Sentinel delivers good value for the price?

Not sure

Are you happy with Microsoft Sentinel's feature set?

Yes

Did Microsoft Sentinel live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Microsoft Sentinel go as expected?

I wasn't involved with the implementation phase

Would you buy Microsoft Sentinel again?

No

I would recommend Microsoft Sentinel for companies and organizations that are very Microsoft centric. If you are utilizing services and cloud providers other than Microsoft, Microsoft Sentinel has clear limitations.

Microsoft Sentinel Feature Ratings

Centralized event and log data collection
6
Correlation
5
Event and log normalization/management
7
Deployment flexibility
6
Integration with Identity and Access Management Tools
6
Custom dashboards and workspaces
5
Log retention
4
Behavioral analytics and baselining
5
Rules-based and algorithmic detection thresholds
5
Incident indexing/searching
3