{"id":3073,"date":"2024-06-25T09:31:19","date_gmt":"2024-06-25T08:31:19","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=3073"},"modified":"2026-04-07T16:53:33","modified_gmt":"2026-04-07T15:53:33","slug":"what-is-microsoft-sentinel","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/","title":{"rendered":"What is Microsoft Sentinel? Explained"},"content":{"rendered":"\n<p>As the global landscape becomes increasingly more technology-driven, the cyber threats confronting businesses continue to escalate.&nbsp; Recent reports indicate that in the past 12 months, 70% of UK businesses have suffered a cyber security breach<sup data-fn=\"80fa320f-e418-4d07-9877-98241248b4b6\" class=\"fn\"><a href=\"\/#80fa320f-e418-4d07-9877-98241248b4b6\" id=\"80fa320f-e418-4d07-9877-98241248b4b6-link\">1<\/a><\/sup>, confirming that it is not a question of \u2018if\u2019 but \u2018when\u2019 an organisation be breached.<\/p>\n\n\n\n<p>Therefore, organisations must implement effective cybersecurity tools and processes to protect themselves from imminent threats. In this blog, we explore the vital role that Sentinel Solution plays in securing your organisation, whilst ultimately, answering the question, \u2018What is Microsoft Sentinel?\u2019.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\" id=\"h-introducing-microsoft-sentinel\">Introducing Microsoft Sentinel<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/cwsisecurity.com\/microsoft-sentinel-engagement\/\"><strong>Microsoft Sentinel<\/strong><\/a><strong> is Microsoft\u2019s comprehensive solution for both cloud-native <\/strong><a href=\"https:\/\/cwsisecurity.com\/what-is-the-difference-between-a-siem-and-a-soc\/\"><strong>security information and event management (SIEM)<\/strong><\/a><strong> and security orchestration, automation, and response (SOAR).<\/strong><\/p>\n\n\n\n<p>Microsoft <a href=\"https:\/\/cwsisecurity.com\/case_studies\/cwsi-rolls-out-sentinelone-for-leading-payroll-software-company-bright\/\">Sentinel<\/a> utilises machine <a href=\"https:\/\/cwsisecurity.com\/our-ai-consulting-services\/\">AI<\/a> to enhance your investigation and threat detection, reducing the volume of alerts and shortening resolution time frames. The solution consumes <a href=\"https:\/\/cwsisecurity.com\/security-and-threat-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat intelligence<\/a> based on a wide catalogue of connectors, including key <a href=\"https:\/\/cwsisecurity.com\/vendors\/microsoft\/\">Microsoft<\/a> threat intelligence sources as well as several 3<sup>rd<\/sup> party connectors, allowing you to bring in your own threat intelligence.<\/p>\n\n\n\n<p>Due to the solution&#8217;s ability to integrate with a wide range of systems &#8211; the automated response to cyber threats means IT teams can respond efficiently and effectively.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-can-microsoft-sentinel-do\">What Can Microsoft Sentinel Do?<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Microsoft Sentinel is a cloud-native <a href=\"https:\/\/cwsisecurity.com\/what-is-a-managed-siem\/\" target=\"_blank\" rel=\"noreferrer noopener\">SIEM<\/a> and SOAR solution, that performs advanced AI-driven security analytics for increased visibility. By performing this, Sentinel integrates security data from multiple sources, both in and outside of Microsoft, which reduces overall infrastructure complexity.<\/p>\n\n\n\n<p>By leveraging AI and machine learning, Microsoft Sentinel analyses over 6.5 trillion signals daily. This delivers advanced threat intelligence through a variety of data connectors, such as Microsoft sources and third-party technologies like Cisco and AWS.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-enhanced-data-collection\">Enhanced Data Collection<\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Microsoft Sentinel has the ability to successfully collect data across all users, devices, applications, and infrastructure, both on premise and in multiple clouds. This increased capability means that you can have full visibility over your entire IT estate, whether it be in a hybrid setting or on-premises.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-detection\">Detection<\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Sentinel can detect previously undetected threats and reduce the alerts of false positives by using Microsoft\u2019s analytics and exceptional <a href=\"https:\/\/cwsisecurity.com\/types-of-threat-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat intelligence<\/a>. In order to protect critical data and assets, the detection process will help mitigate all the risks associated with online security.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-investigation\">Investigation<\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The Microsoft Sentinel solution investigates threats by using <a href=\"https:\/\/cwsisecurity.com\/enterprise-ai-adoption\/\">artificial intelligence<\/a> and hunts for abnormal activities at scale. By learning the context and how an attack unfolded, the investigation provides timelines and visualisations that make it easier to understand an attacker&#8217;s motive and scope.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-response\">Response<\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>You\u2019ll be able to respond to cyber attacks quickly as Microsoft Sentinel\u2019s built- in response processes allow automatic response to occur when a specific alert or incident triggers an automation rule. This automation reduces response times and neutralises threats before they grow larger.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-deploying-microsoft-sentinel\">Deploying Microsoft Sentinel<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>What you need:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An active Azure subscription<\/li>\n\n\n\n<li>Log Analytics workspace<\/li>\n<\/ul>\n\n\n\n<p>Once these are complete, you can access Sentinel within the <a href=\"https:\/\/cwsisecurity.com\/our-services-old\/azure-security-services\/\">Azure<\/a> portal to deploy. Following its activation, you must then determine which data sources you require to be added.<\/p>\n\n\n\n<p>Microsoft has several <a href=\"https:\/\/cwsisecurity.com\/achieving-an-out-of-the-box-experience-oobe\/\" target=\"_blank\" rel=\"noreferrer noopener\">out-of-the-box<\/a> data connectors including, Office 365, Azure AD, <a href=\"https:\/\/cwsisecurity.com\/our-vendors\/microsoft-secure365-managed-service\/\">Microsoft 365<\/a> Defender and Defender for <a href=\"https:\/\/cwsisecurity.com\/cloud-app-security-services\/\">Cloud Apps<\/a>. Additionally, Sentinel provides over 100 out-of-the-box data connectors for non-Microsoft solutions, including AWS, Barracuda, Cisco, and Symantec. The solution also provides support for generic connectors which allows you to send data via Windows Firewall, Syslog, REST API, or common event format (CEF), enabling you to communicate information from any data source. The solution is completely customisable to your environment.<\/p>\n\n\n\n<p>After the data connectors have been authorised, Microsoft Sentinel will start analysing your environment and reporting on potential threats using built-in alert rules. However, to access the full potential of Microsoft Sentinel\u2019s capabilities, you must utilise the solution&#8217;s ability to write custom alert rules and automated playbooks to aid in efficiently detecting and responding to threats.<\/p>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-are-playbooks\">What are Playbooks?<\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A playbook is a library of remediation actions that you can run from within Microsoft Sentinel, to help automate and orchestrate your threat response.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-are-workbooks\">What are Workbooks?<\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Workbooks provide a flexible canvas for data analysis and create informative reports within Microsoft Sentinel to allow you to gain insights fast across all your data.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-are-watch-lists\">What are Watch Lists?<\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Watchlists enable you to correlate data from the data sources you provide with the events in your Microsoft Sentinel Environment.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-microsoft-sentinel-s-solution-for-future-protection\">Microsoft Sentinel\u2019s Solution for Future Protection<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In the Ignite event in 2023, Microsoft announced the integration of Sentinel, Defender XDR (formerly Microsoft 365 Defender), and Copilot for Security, combining their strengths into an AI-powered SOC suite.<\/p>\n\n\n\n<p>Bringing all these tools together will create a fully-fledged <a href=\"https:\/\/cwsisecurity.com\/what-is-the-difference-between-a-siem-and-a-soc\/\">SOC<\/a> suite, providing complete visibility for investigation and response across the entire estate. Such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email and collaboration tools<\/li>\n\n\n\n<li>Cloud apps<\/li>\n\n\n\n<li>Data<\/li>\n\n\n\n<li>Endpoints<\/li>\n\n\n\n<li>Hybrid Identities&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>By integrating <a href=\"https:\/\/cwsisecurity.com\/technology-talks-microsoft-copilot-for-security\/\">Microsoft Copilot<\/a> for Security, generative AI enhances analysis and processes, such as translating natural language into KQL. SOCs require visibility to handle threats, and advanced technology is crucial for addressing constantly evolving cyber risks.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-contact-our-microsoft-experts-today\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Contact Our Microsoft Experts Today<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"popmake-3125\">For over a decade, CWSI has played a crucial role in helping customers stay safe and secure. CWSI\u2019s specialist expertise in the Microsoft stack has led them to become a selected member of the Microsoft Intelligent Security Association, which is an exclusive group of premiere security partners.&nbsp;With three Microsoft Security Specialisations in&nbsp;<a href=\"https:\/\/cwsisecurity.com\/identity-and-access-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identity and Access Management<\/a>, Information Protection and <a href=\"https:\/\/cwsisecurity.com\/governance-risk-and-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">Governance<\/a>, and&nbsp;<a href=\"https:\/\/cwsisecurity.com\/threat-protection-engagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Protection<\/a>, CWSI is your trusted Microsoft security partner.<\/p>\n\n\n\n<p class=\"popmake-3125\"><a href=\"https:\/\/cwsisecurity.com\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">Get in touch<\/a> with our security experts today to begin your Microsoft security journey.<\/p>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2024-08-29\/krdcg\" width=\"100%\" height=\"650\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"80fa320f-e418-4d07-9877-98241248b4b6\">UK Gov Cyber Security Breaches Survey 2024 <a href=\"#80fa320f-e418-4d07-9877-98241248b4b6-link\" aria-label=\"Ga naar voetnoot referentie 1\">\u21a9\ufe0e<\/a><\/li><\/ol>\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/overview?tabs=azure-portal\">What is Microsoft Sentinel? | Microsoft Learn<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/deploy-overview\">Deployment guide for Microsoft Sentinel | Microsoft Learn<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/watchlists\">Watchlists in Microsoft Sentinel &#8211; Microsoft Sentinel | Microsoft Learn<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the global landscape becomes increasingly more technology-driven, the cyber threats confronting businesses continue to escalate.&nbsp; Recent reports indicate that in the past 12 months, 70% of UK businesses have suffered a cyber security breach, confirming that it is not a question of \u2018if\u2019 but \u2018when\u2019 an organisation be breached. Therefore, organisations must implement effective [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":487,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"[{\"content\":\"UK Gov Cyber Security Breaches Survey 2024\",\"id\":\"80fa320f-e418-4d07-9877-98241248b4b6\"}]"},"categories":[93,4],"tags":[],"class_list":["post-3073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Microsoft Sentinel? | Blog | CWSI<\/title>\n<meta name=\"description\" content=\"Discover what Microsoft Sentinel is, how it works, and how it can be beneficial for improving your organisation\u2019s cybersecurity in this detailed guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Microsoft Sentinel? Explained\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-25T08:31:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T15:53:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/\"},\"headline\":\"What is Microsoft Sentinel? Explained\",\"datePublished\":\"2024-06-25T08:31:19+00:00\",\"dateModified\":\"2026-04-07T15:53:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/\"},\"wordCount\":947,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/\",\"name\":\"What is Microsoft Sentinel? | Blog | CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2024-06-25T08:31:19+00:00\",\"dateModified\":\"2026-04-07T15:53:33+00:00\",\"description\":\"Discover what Microsoft Sentinel is, how it works, and how it can be beneficial for improving your organisation\u2019s cybersecurity in this detailed guide.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-sentinel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Microsoft Sentinel? Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Microsoft Sentinel? | Blog | CWSI","description":"Discover what Microsoft Sentinel is, how it works, and how it can be beneficial for improving your organisation\u2019s cybersecurity in this detailed guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/","og_locale":"nl_NL","og_type":"article","og_title":"What is Microsoft Sentinel? Explained","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/","og_site_name":"CWSI","article_published_time":"2024-06-25T08:31:19+00:00","article_modified_time":"2026-04-07T15:53:33+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"5 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/"},"headline":"What is Microsoft Sentinel? Explained","datePublished":"2024-06-25T08:31:19+00:00","dateModified":"2026-04-07T15:53:33+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/"},"wordCount":947,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/","url":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/","name":"What is Microsoft Sentinel? | Blog | CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/#primaryimage"},"thumbnailUrl":"","datePublished":"2024-06-25T08:31:19+00:00","dateModified":"2026-04-07T15:53:33+00:00","description":"Discover what Microsoft Sentinel is, how it works, and how it can be beneficial for improving your organisation\u2019s cybersecurity in this detailed guide.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-sentinel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"What is Microsoft Sentinel? Explained"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=3073"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3073\/revisions"}],"predecessor-version":[{"id":8350,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3073\/revisions\/8350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=3073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=3073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=3073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}