
What I appreciate most about Microsoft Sentinel is its seamless combination of SIEM and SOAR within a truly cloud-native environment. Its strong integration with the Microsoft ecosystem—particularly Azure, Entra ID, Defender, and M365—delivers immediate visibility and requires very little onboarding effort. The platform’s use of KQL empowers flexible and robust threat hunting, while the built-in analytics rules and UEBA features help to significantly reduce alert fatigue. Additionally, automation via Logic Apps enables security teams to respond more quickly and consistently, making Sentinel a highly scalable and cost-effective solution for today’s SOC operations. Review collected by and hosted on G2.com.
One aspect I find challenging about Microsoft Sentinel is managing costs, particularly as usage grows, because the pricing model relies heavily on the amount of data ingested and retained. While KQL is a powerful tool, it presents a learning curve for teams who are new to it, which can slow down the adoption process. In addition, implementing advanced SOAR use cases often demands considerable customization through Logic Apps, and troubleshooting these automations can be quite complex. Lastly, Sentinel tends to work best within the Microsoft ecosystem, which can be a drawback for organizations that rely on a variety of non-Microsoft security tools. Review collected by and hosted on G2.com.
Validated through LinkedIn
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.




