
Starting today, incidents, schema, and alerts are shared between Azure Sentinel and Microsoft 365 Defender. Azure Sentinel accepts logs across your environment with many third-party security products and can go a step further with Azure Defender and Microsoft 365 Defender. Most SIEMs on the market today simply take logs from multiple sources. Today we are taking the next step in unifying these experiences and delivering enhanced tools and intelligence to stop modern threats.

We combined the breadth of Azure Sentinel, our cloud-native SIEM (security information and event management) with the depth of Microsoft 365 Defender and Azure Defender, our XDR (extended detection and response) tools, to help fight against attacks that take advantage of today’s diverse, distributed, and complex environments. To help protect against advanced attacks, last September at Microsoft Ignite we shared our vision to create the most complete approach to securing your digital landscape, all under a single umbrella. Here at Microsoft, we’re committed to applying these learnings to help create a stronger, more unified approach to security for all-no matter what platform you’re on, device you’re trying to protect, or cloud your data is in. 2020 showed us that while we have made great progress, there is still a lot we can do as individuals, organizations, and as a community to keep secure.
AZURE SENTINEL DEMONSTRATION SERIES
