New Course Enquiry:
9513167997
9108318017
There is a high demand in the market for a tool that can collect data from various sources, do the correlation, and report the information in a single dashboard.
Azure Sentinel is a cloud-native SIEM (Security Information and Event Management) and SOAR (Security Orchestration and Automated Response ) technology from Microsoft. It uses built-in AI to perform alert detection, threat visibility, threat response, and proactive hunting.
Azure Sentinel analyzes large volumes of data across an organization with the help of its Logic Apps and Log Analytics. It has advanced machine learning capabilities, which can identify security threats, and suspicious activities, responding to them easily.
Microsoft Azure Sentinel do the following tasks:
Read about What is Log4j vulnerability issue – how to detect and fix it…
As Azure is a SIEM and SOAR solution is part of Microsoft, the first thing to do is to take an Azure subscription for the deployment. Azure Sentinel performs the data collection from the different sources that you configure and store these events in your preferred Log Analytics workspace. For this, you can use an existing workspace or create a new one. However, it is suggested that you have a fixed workspace for Azure Sentinel data storage as its investigations and alerts do not work across different workspaces. You should have at least as contributor permission as possible for the subscription in accordance with the fixed workspace.

azure sentinel architecture
Now let us understand about Azure Sentinel’s architecture.
Azure Sentinel can collect data on-premises and in multiple cloud environments from all users, applications, devices, and infrastructure. It has an easy graphical interface for connecting to security sources. Since there are various connectors that have real-time integrations, Azure Sentinel also has built-in third-party product (non-Microsoft Solutions) and service interfaces. Moreover, Azure Sentinel can connect to the relevant data sources via REST-API, Common Event Format (CEF), or Syslog.
The following are the services that can be integrated directly via out-of-the-box:
Other data sources not given in the list can also be easily connected to Azure Sentinel using an agent. The Syslog protocol is used to allow for real-time log streaming. In the Azure Sentinel architecture, the Agent function‘s component Log Analytics Agent, converts CEF-formatted logs into a Log Analytics format that is compatible.
Some of the examples of external solutions supported by Azure Sentinel via agents are;
Azure Sentinel is used to detect threats and lowers false positives using analytics and threat intelligence from Microsoft. Azure Analytics plays an important role in correlating alerts with the security identified issues.
Azure Sentinel comes with built-in templates for threat detection and its automated responses. Moreover Azure Sentinel also allows creating custom rules. The four built-in templates are listed below:
Microsoft Azure Sentinel architecture workings can detect and track suspicious behaviours across the enterprise. By the MITRE framework, it helps lower noise and identify security threats. To detect suspicious activity, Azure Sentinel architecture uses its buitl-in AI to detect threats before an alert is triggered.
You can bookmark the data or events that you come across in the searching process. It is so that you can review it later. Then, create an incident for investigation’s for later.
Notebooks are the same as playbooks as both offer step-by-step guides which are used to keep tracking of your searches and rescue operations. The notebook’s work is to compile all the processes ongoing in the hunting process into a reusable playbook. And that is then shared with other team members.
It is an important feature to help you out of the tables and the query language by Microsoft. You can also develop new queries or modify old ones to improve your detecting methods..
It is built on top of a query language best suited for hunting threats.
Azure Sentinel can handle built-in orchestration incidents seamlessly and swiftly, and routine and repetitive activities may be readily automated. It can use playbooks to create easier security orchestration. When an event occurs, it can also create tickets in ServiceNow, Jira, and other systems.
Must read about QRadar tool and its architecture in detail.

azure architecture components
The components are presented below:
Also read about our blog on Splunk Career – the pathway to MNC jobs.
In this blog, we have completed discussing Microsoft Azure Sentinel architecture, its core capabilities, and the components. For more details about Azure Sentinel training, Kindly visit Virtual Azure Course with lab-access.
You can find our trainings at your city also:
Azure Sentinel Training in Bangalore , Azure Sentinel Training in Bhopal , Azure Sentinel Training in Bhubaneswar , Azure Sentinel Training in Chandigarh , Azure Sentinel Training in Chennai , Azure Sentinel Training in Delhi , Azure Sentinel Training in Gurgaon , Azure Sentinel Training in Hyderabad , Azure Sentinel Training in Pune.