Microsoft Sentinel is Azure's cloud-native SIEM + SOAR offering. It uses Log Analytics workspaces as storage and Kusto Query Language (KQL) for search and detection.
Key building blocks:
- Data connectors for Microsoft 365, Defender, Azure AD, AWS, GCP, syslog/CEF.
- Analytics rules (scheduled KQL queries that generate incidents).
- Workbooks for visualisation.
- Playbooks (Logic Apps) for SOAR automation.
- UEBA, Watchlists, Threat Intelligence integrated natively.