david dominguez 😺

Introduction to SIEM, and Sentinel

Mar 17, 2026

What are logs?

Logs are records of events generated by a system or application. In an enterprise SIEM environment, logs are an output from specific security appliances/devices. They have a very tight scope as to what they are looking at (e.g. All network traffic, authentication logs, EDR logs, etc.)

TimestampSource IPDest IPSource PortDest PortProtocolRule NameActionTraffic TypeSeverity
2024-03-14 08:15:23192.168.1.105203.0.113.4554321443TCPAllow_HTTPS_InternalALLOWEDInternal to ExternalLow
2024-03-14 08:18:4710.0.2.50192.168.1.15342122TCPBlock_SSH_ExternalBLOCKEDExternal to InternalHigh
2024-03-14 08:22:10192.168.1.2008.8.8.85234153UDPAllow_DNSALLOWEDInternal to ExternalLow
2024-03-14 08:25:33203.0.113.99192.168.1.5045123445TCPBlock_SMB_ExternalBLOCKEDExternal to InternalCritical
2024-03-14 08:29:5610.0.1.25172.16.0.10552343306TCPAllow_Database_InternalALLOWEDInternal to InternalLow

What’s a Security Information Event Management (SIEM) solution?

A SIEM solution, put simply, collects all the security-relevant logs within a large enterprise, and puts it all into a centralized location, for future detection and analysis. I’ve provided an ASCII visual below to demonstrate how the flow usually looks like.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   LOG SOURCES            β”‚      β”‚   SIEM                     β”‚      β”‚   USERS                  β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€      β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€      β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                          β”‚      β”‚                            β”‚      β”‚                          β”‚
β”‚  πŸ–₯️  Firewalls           β”‚      β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚      β”‚  πŸ‘€ Security Analysts    β”‚
β”‚  πŸ–₯️  Servers             β”‚      β”‚  β”‚ Log Ingestion        β”‚  β”‚      β”‚  πŸ‘€ SOC Engineers        β”‚
β”‚  πŸ–₯️  Endpoints           β”‚      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚      β”‚  πŸ‘€ DevOps Teams         β”‚
β”‚  πŸ–₯️  Network Devices     β”‚ ---> β”‚           ↓                β”‚ <--- β”‚  πŸ‘€ Security Managers    β”‚
β”‚  πŸ–₯️  Cloud Services      β”‚      β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚      β”‚                          β”‚
β”‚  πŸ–₯️  Web Applications    β”‚      β”‚  β”‚ Correlation &        β”‚  β”‚      β”‚  Activities:             β”‚
β”‚  πŸ–₯️  Databases           β”‚      β”‚  β”‚ Enrichment           β”‚  β”‚      β”‚  β€’ Investigate alerts    β”‚
β”‚  πŸ–₯️  Active Directory    β”‚      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚      β”‚  β€’ Analyze threats       β”‚
β”‚  πŸ–₯️  IDS/IPS Systems     β”‚      β”‚           ↓                β”‚      β”‚  β€’ Configure rules       β”‚
β”‚  πŸ–₯️  Proxy/WAF           β”‚      β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚      β”‚  β€’ Tune SIEM             β”‚
β”‚  πŸ–₯️  DNS Servers         β”‚      β”‚  β”‚ Alerting &           β”‚  β”‚      β”‚  β€’ Review dashboards     β”‚
β”‚      ...                 β”‚      β”‚  β”‚ Dashboarding         β”‚  β”‚      β”‚  β€’ Create reports        β”‚
β”‚                          β”‚      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚           ↓                β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚  β”‚ Data Storage &       β”‚  β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚  β”‚ Retention            β”‚  β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚      β”‚                          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Why do we care about a SIEM?

To understand the importance of a SIEM, I think it’s better explained if we think of the alternative, what is life like without a SIEM? Let’s show an example workflow of a Security Analyst responding to an alert:

This is an overly focused example, but the point comes across well. A SIEM allows Security Analysts to thoroughly investigate alerts without the need to switch to multiple tabs. As an analyst, if they are constantly switching tabs within a specific alert, it can be easy to get very lost and overwhelmed due to the amount of context switching that is required within each tab. If they are kept on a single area, they can be more efficient with their time since they are not performing a hard context switch.

Additionally, correlation is extremely valuable in a SIEM. Being able to have the ability to directly tune out alerts due to another log source’s information is valuable, because it avoids analysts doing extremely repetitive work.

In a nutshell, anything that an analyst does repetitively and often, is a strong candidate for automation, correlation, or dashboard/report creation.

What is Microsoft Sentinel?

Microsoft Sentinel is the SIEM I work on often for our clients. It is a cloud-native SIEM that collects log source data and analyzes said data to support threat protection for organizations, as per Microsoft’s definition.

How can you play with it?

Sentinel is available via Azure, which is Microsoft cloud platform. Once logged into Azure, type in β€˜Sentinel’ in the search box, and you can choose to spin up a Sentinel instance. Pricing is based on how many logs you are ingesting, and it is not cheap, so tread carefully and appropriately forecast anticipated volume of logs to bring in. Feel free to send me a message if you are confused about pricing or if you want to learn more cost-saving strategies.