Updated: September 6, 2024 (September 6, 2024)

  Analyst Report

Sentinel Log Ingestion

My Atlas / Analyst Reports

222 wordsTime to read: 2 min
Wes Miller by
Wes Miller

Wes Miller analyzes and writes about Microsoft’s security, identity management, and systems management technologies. Before joining Directions on Microsoft, Wes... more

Microsoft Sentinel can ingest and process most types of log data for further analysis. Sentinel can ingest log data from the following sources:

  • Microsoft 365 services, including Office 365 services and Entra ID
  • Microsoft Defender XDR services, including Defender for Endpoint, Defender for Identity, and Defender for Office 365, as well as Microsoft Defender for Cloud Apps
  • Microsoft Defender for Cloud (in preview)
  • Sources that support the Microsoft Graph REST-based API 
  • Sources with third-party APIs supported by Microsoft Sentinel, like Google Workspace or Salesforce Service Cloud (via Azure Functions)
  • Sources supported by the Log Analytics agent software
  • Common Event Format (CEF) or Syslog sources.

With a handful of exceptions, organizations must pay a per-GB data charge for all event and alert data ingested into Log Analytics, and again when that data is ingested into Sentinel.

Sentinel can also ingest data from third-party security solutions, including Check Point Systems, F5, Fortinet, Palo Alto Networks, Symantec, and other vendors, and most of these connectors are formally documented online in Sentinel documentation. However, customers using many of these technologies are likely to already have SIEM solutions like Splunk in place.

Atlas Members have full access

Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.

Membership Options

Already have an account? Login Now