Microsoft Sentinel Analytics & Incidents
m365-azureIdentity & DirectorySIEM / Log AggregatorCloud Admin Portal
Location
Azure Portal > Microsoft Sentinel > Incidents, Analytics rules, Hunting queriesDescription
SIEM platform aggregating logs from all Microsoft and third-party sources with built-in analytics rules generating security incidents, entity mapping to users/hosts/IPs, investigation graphs, and automated response playbooks.
Forensic Value
Sentinel incidents aggregate related alerts from multiple detection sources into unified investigations with entity mapping. The investigation graph visually maps relationships between users, IPs, hosts, and alerts. Built-in analytics rules detect common attack patterns across log sources. Bookmarked hunting query results preserve evidence found during proactive threat hunting. Watchlists and threat intelligence indicators provide IOC matching across all ingested data sources.
Tools Required
Azure Portal (Sentinel)KQL (Kusto Query Language)Microsoft Graph Security APIAzure CLI