{"id":42396,"date":"2021-08-18T16:00:46","date_gmt":"2021-08-18T16:00:46","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=95700"},"modified":"2021-08-18T16:00:46","modified_gmt":"2021-08-18T16:00:46","slug":"migrating-content-from-traditional-siems-to-azure-sentinel","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/","title":{"rendered":"Migrating content from traditional SIEMs to Azure Sentinel"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/MSC19_microsoftInclusion_redmond_002.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"entry-content\">\n<p>In part two of this three-part series, we covered the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/08\/03\/how-to-manage-a-side-by-side-transition-from-your-traditional-siem-to-azure-sentinel\/\" target=\"_blank\" rel=\"noopener\">five types of side-by-side security information and event management (SIEM) configurations<\/a> commonly used during a long-term migration to <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/#overview\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Sentinel<\/a>. For part three, we\u2019ll be looking at best practices for migrating your data and detections while operating side-by-side with your on-premises SIEM, as well as ways to maximize Azure Sentinel\u2019s powerful automation capabilities to streamline common tasks.<\/p>\n<p>The information presented here is derived from experiences we\u2019ve accumulated while assisting numerous customer migrations, as well as experiences gained by Microsoft\u2019s own security operations center (SOC) in protecting our IT infrastructure. Typically, the migration to Azure Sentinel is undertaken in three phases: starting with data, then detection rules, and finally by automating workflows.<\/p>\n<h2>Migrating data to Azure Sentinel<\/h2>\n<p>The first time your security operations (SecOps) team logs into Azure Sentinel, they\u2019ll find it pre-loaded with built-in data connectors that make it easy to ingest data from across your organization. Still, it\u2019s in your interest to be selective; migration provides an opportunity to re-evaluate your security needs and leave behind content that\u2019s no longer useful. Think holistically about your use cases, then map the data required to support them. You\u2019ll want to identify any lingering gaps in visibility from your legacy SIEM and determine how to close them.<\/p>\n<p>Most SecOps teams begin by ingesting their cloud data into Azure Sentinel. For an easy first step, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-azure-activity\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Activity logs<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-office-365\" target=\"_blank\" rel=\"noopener\">Microsoft Office 365 audit logs<\/a> are both free to ingest and give you immediate visibility into Azure and <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\" target=\"_blank\" rel=\"noopener\">Office 365<\/a> activity. You can also ingest alerts from <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-sentinel\/whats-new-azure-sentinel-and-microsoft-365-defender-incident\/ba-p\/2191090\" target=\"_blank\" rel=\"noopener\">Microsoft Defender<\/a> products, <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/itops-talk-blog\/what-s-the-difference-between-azure-security-center-azure\/ba-p\/2155188\" target=\"_blank\" rel=\"noopener\">Azure Security Center<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-cloud-app-security\" target=\"_blank\" rel=\"noopener\">Microsoft Cloud App Security<\/a>, and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-azure-information-protection\" target=\"_blank\" rel=\"noopener\">Azure Information Protection<\/a>\u2014all for free.<\/p>\n<p>Many security teams choose to ingest enriched data from security products across the organization while using Azure Sentinel to correlate between them. This eliminates the need to ingest raw logs from the data sources, which can be costly. As you migrate your detections and build out use cases in Azure Sentinel, be sure to verify the value of any data as it relates to your key priorities.<\/p>\n<h2>Migrating detection rules<\/h2>\n<p>A key task for your migration involves <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-sentinel\/best-practices-for-migrating-detection-rules-from-arcsight\/ba-p\/2216417\" target=\"_blank\" rel=\"noopener\">translating existing detection rules<\/a> to map to Azure Sentinel, which employs <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/data-explorer\/kusto\/query\/\" target=\"_blank\" rel=\"noopener\">Kusto Query Language<\/a> (KQL) and can be used easily across other Microsoft solutions, such as <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/endpoint-defender\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Endpoint<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-monitor\/app\/app-insights-overview\" target=\"_blank\" rel=\"noopener\">Microsoft Application Insights<\/a>.<\/p>\n<h3>Azure Sentinel has four built-in rule types:<\/h3>\n<ol>\n<li><strong>Alert grouping:<\/strong> Reduces alert fatigue by grouping up to 150 alerts within a given timeframe, using three <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-sentinel\/what-s-new-reduce-alert-noise-with-incident-settings-and-alert\/ba-p\/1187940\" target=\"_blank\" rel=\"noopener\">alert grouping<\/a> options: matching entities, alerts triggered by the scheduled rule, and matches of specific entities.<\/li>\n<li><strong>Entity mapping:<\/strong> Enables your SecOps engineers to define entities to be tracked during the investigation. <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/map-data-fields-to-entities\" target=\"_blank\" rel=\"noopener\">Entity mapping<\/a> also makes it possible for analysts to take advantage of the intuitive <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/tutorial-investigate-cases#:~:text=%20To%20use%20the%20investigation%20graph%3A%20%201,incidents%20up%20to%2030%20days%20old.%20More%20\" target=\"_blank\" rel=\"noopener\">Investigation Graph<\/a> to reduce time and effort.<\/li>\n<li><strong>Evidence summary:<\/strong> Surfaces events, alerts, and bookmarks associated with a particular incident within the preview pane. Entities and tactics also show up in the incident pane\u2014providing a snapshot of essential details and enabling faster triage.<\/li>\n<li><strong>KQL:<\/strong> The request is sent to a Log Analytics database and is stated in plain text, using a data-flow model that makes the syntax easy to read, author, and automate. Because several other Microsoft services also store data in <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-monitor\/logs\/log-analytics-tutorial\" target=\"_blank\" rel=\"noopener\">Azure Log Analytics<\/a> or <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/data-explorer\/\" target=\"_blank\" rel=\"noopener\">Azure Data Explorer<\/a>, this reduces the learning curve needed to query or correlate.<\/li>\n<\/ol>\n<p>Because Azure Sentinel uses machine learning analytics to produce high-fidelity and actionable incidents, it\u2019s likely that some of your existing detections won\u2019t be required anymore.<\/p>\n<h3>Remember:<\/h3>\n<ul>\n<li>Don\u2019t migrate all the rules blindly; focus on quality, not quantity.<\/li>\n<li>Leverage available resources. Review all the <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Detections\" target=\"_blank\" rel=\"noopener\">Azure Sentinel built-in rules<\/a> to identify out-of-the-box rules that can quickly address your use cases. Explore community resources such as <a href=\"https:\/\/my.socprime.com\/tdm\/\" target=\"_blank\" rel=\"noopener\">SOC Prime Threat Detection Marketplace<\/a>.<\/li>\n<li>Confirm connected data sources and review your data connection methods. Revisit data collection conversations to ensure data depth and breadth across the use cases you plan to detect.<\/li>\n<li>Select use cases that justify rule migration in terms of business priority and efficacy:\n<ul>\n<li>Review rules that haven\u2019t triggered any alerts in the last 6 to 12 months.<\/li>\n<li>Eliminate low-level threats or alerts you routinely ignore.<\/li>\n<li>Prepare a validation process\u2014define test scenarios and build a test script.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Maximizing automation<\/h2>\n<p>Automating workflows can streamline both common and critical tasks by enabling your SecOps team to group alerts into a common incident, then modify its priority. Also, automated playbooks in Azure Sentinel enable easy integration with third-party ticketing solutions, <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-sentinel\/azure-sentinel-incident-bi-directional-sync-with-servicenow\/ba-p\/1667771\" target=\"_blank\" rel=\"noopener\">such as ServiceNow<\/a>.<\/p>\n<p>But automation isn\u2019t just about running tasks in the background. From within the investigation, your team can use an automated playbook to gather additional information or apply remediation action; helping an analyst to accomplish more in less time. You\u2019re also free to iterate and refine over time, moving to full automation for response. Browse the <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Playbooks\" target=\"_blank\" rel=\"noopener\">GitHub playbooks<\/a> to get new ideas and learn about the most common automation flows.<\/p>\n<h2>Discontinuing your legacy SIEM<\/h2>\n<p>By keeping your highest priorities and defined use cases in sight, you\u2019ll develop a sense for when you\u2019re ready to retire your legacy SIEM and move completely to Azure Sentinel. Based on our experience, customers who feel they\u2019re ready to switch off their old SIEM should first complete this basic checklist:<\/p>\n<h3>Technology<\/h3>\n<ul>\n<li><strong>Check critical data:<\/strong> Make sure sources and alerts are available in Azure Sentinel.<\/li>\n<li><strong>Archive all records:<\/strong> Save critical records of past incidents and cases (raw data optional) to retain institutional history.<\/li>\n<\/ul>\n<h3>Processes<\/h3>\n<ul>\n<li><strong>Playbooks:<\/strong> Update <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/tutorial-investigate-cases\" target=\"_blank\" rel=\"noopener\">investigation and hunting processes<\/a> for Azure Sentinel.<\/li>\n<li><strong>Metrics:<\/strong> Ensure that all key metrics can be obtained completely from Azure Sentinel. Create <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/tutorial-monitor-your-data\" target=\"_blank\" rel=\"noopener\">custom workbooks<\/a>, or use built-in workbook templates to quickly gain insights as soon as you <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-data-sources\" target=\"_blank\" rel=\"noopener\">connect to data sources<\/a>.<\/li>\n<li><strong>Cases:<\/strong> Make sure all current cases are transferred to the new system (including required source data).<\/li>\n<\/ul>\n<h3>People<\/h3>\n<h2>Learn more<\/h2>\n<p>By moving completely to Azure Sentinel, your organization may see significant savings on infrastructure, licensing, and staff hours, all while benefitting from real-time threat analysis and the easy scalability that comes with operating a cloud-native SIEM.<\/p>\n<p>I hope this three-part series has helped answer some of your questions about the migration process. You can read parts one and two of the series here:<\/p>\n<p>For a complete overview of the migration journey, as well as links to additional resources, download the white paper: <a href=\"https:\/\/azure.microsoft.com\/mediahandler\/files\/resourcefiles\/azure-sentinel-migration-fundamentals\/Azure%20Sentinel%20Migration%20Fundamentals.pdf\" target=\"_blank\" rel=\"noopener\">Azure Sentinel Migration Fundamentals<\/a>.<\/p>\n<div class=\"entry-content\">\n<p class=\"x-hidden-focus\">To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<\/div><\/div>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/08\/18\/migrating-content-from-traditional-siems-to-azure-sentinel\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Get tips on migrating data and detections from your on-premises SIEM to Azure Sentinel, including how to streamline tasks using automation.<br \/>\nThe post Migrating content from traditional SIEMs to Azure Sentinel appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42397,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-42396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Migrating content from traditional SIEMs to Azure Sentinel 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Migrating content from traditional SIEMs to Azure Sentinel 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-18T16:00:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Migrating content from traditional SIEMs to Azure Sentinel\",\"datePublished\":\"2021-08-18T16:00:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/\"},\"wordCount\":1119,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/\",\"name\":\"Migrating content from traditional SIEMs to Azure Sentinel 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg\",\"datePublished\":\"2021-08-18T16:00:46+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/migrating-content-from-traditional-siems-to-azure-sentinel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Migrating content from traditional SIEMs to Azure Sentinel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Migrating content from traditional SIEMs to Azure Sentinel 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/","og_locale":"en_US","og_type":"article","og_title":"Migrating content from traditional SIEMs to Azure Sentinel 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-18T16:00:46+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Migrating content from traditional SIEMs to Azure Sentinel","datePublished":"2021-08-18T16:00:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/"},"wordCount":1119,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/","url":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/","name":"Migrating content from traditional SIEMs to Azure Sentinel 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg","datePublished":"2021-08-18T16:00:46+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/migrating-content-from-traditional-siems-to-azure-sentinel.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/migrating-content-from-traditional-siems-to-azure-sentinel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Migrating content from traditional SIEMs to Azure Sentinel"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42396"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42397"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}