{"id":58910,"date":"2025-07-01T17:00:00","date_gmt":"2025-07-01T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=140893"},"modified":"2025-07-01T17:00:00","modified_gmt":"2025-07-01T17:00:00","slug":"planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/","title":{"rendered":"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0"},"content":{"rendered":"<p><span data-contrast=\"auto\">In November 2023, Microsoft <\/span><a class=\"lia-internal-link lia-internal-url lia-internal-url-content-type-blog\" href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoftsentinelblog\/introducing-a-unified-security-operations-platform-with-microsoft-sentinel-and-d\/3983341\" target=\"_blank\" data-lia-auto-title=\"announced\" data-lia-auto-title-active=\"0\">announced<\/a><span data-contrast=\"auto\"> our strategy to unify security operations by bringing the best of XDR and SIEM together. Our first step was bringing Microsoft Sentinel into the Microsoft Defender portal, giving teams a single, comprehensive view of incidents, reducing queue management, enriching threat intel, streamlining response and enabling SOC teams to take advantage of Gen AI in their day-to-day workflow. Since then, considerable progress has been made with thousands of customers using this new unified experience; to enhance the value customers gain when using Sentinel in the Defender portal, multi-tenancy and multi-workspace support was added to help customers with more sophisticated deployments.<\/span><\/p>\n<p>Our mission is to unify security operations by bringing all your data, workflows, and people together to unlock new capabilities and drive better security outcomes. As a strong example of this, last year we added extended posture management, delivering powerful posture insights to the SOC team. This integration helps build a closed-loop feedback system between your pre- and post-breach efforts. Exposure Management is just one example. By bringing everything together, we can take full advantage of AI and automation to shift from a reactive to predictive SOC that anticipates threats and proactively takes action to defend against them.<\/p>\n<p>Beyond Exposure Management, Microsoft has been constantly innovating in the Defender experience, adding not just SIEM but also Security Copilot. The Sentinel experience within the Defender portal is the focus of our innovation energy and where we will continue to add advanced Sentinel capabilities going forward.<\/p>\n<p>Onboarding to the new unified experience is easy and doesn\u2019t require a typical migration. Just a few clicks and permissions. Customers can continue to use Sentinel in the Azure portal while it is available even after choosing to transition.<span data-ccp-props=\"{}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{}\"><span data-contrast=\"auto\"><strong>Today, we\u2019re announcing that we are moving to the next phase of the transition with a target to retire the Azure portal for Microsoft Sentinel by July 1, 2026.&nbsp; Customers not yet using the Defender portal should plan their transition accordingly.<\/strong><\/span><\/span><\/p>\n<p><span data-ccp-props=\"{}\"><span data-contrast=\"auto\">&nbsp;<\/span><\/span><\/p>\n<p><span class=\"lia-media-object lia-media-is-center lia-media-size-default\" data-image-alt><button aria-labelledby=\"JS195Z_caption\" class=\"lia-media-unstyled-btn\" type=\"button\" aria-haspopup=\"true\" aria-label=\"Enlarge Image <em><span data-contrast=&quot;auto&quot;>Microsoft Sentinel in the Microsoft Defender portal<\/span><\/em>&#8220;><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4\" width=\"999\" height=\"545\" alt><\/button><span class=\"lia-media-caption-text\" id=\"JS195Z_caption\"><em><span data-contrast=\"auto\">Microsoft Sentinel in the Microsoft Defender portal<\/span><\/em><\/span><\/span><\/p>\n<blockquote readability=\"19\">\n<p><em><span data-contrast=\"auto\">\u201cReally amazing to see that coming, because cross querying with tables in one UI is really cool! Amazing, big step forward to the unified [Defender] portal.\u201d<\/span><span data-ccp-props=\"{}\">&nbsp;<\/span><\/em><\/p>\n<p><em><strong><span data-contrast=\"auto\">Glueckkanja AG<\/span><span data-ccp-props=\"{&quot;335572071&quot;:4,&quot;335572072&quot;:1,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:4,&quot;335572076&quot;:4,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:4,&quot;335572080&quot;:1,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:4,&quot;335572084&quot;:4,&quot;335572085&quot;:4278190080,&quot;469789798&quot;:&quot;single&quot;,&quot;469789802&quot;:&quot;single&quot;,&quot;469789806&quot;:&quot;single&quot;,&quot;469789810&quot;:&quot;single&quot;}\">&nbsp;<\/span><\/strong><\/em><\/p>\n<p><em><span data-contrast=\"auto\">\u201cThe biggest benefit of a unified security operations solution (Microsoft Sentinel + Microsoft Defender XDR) has been the ability to combine data in Defender XDR with logs from third party security tools. Another advantage developed has been to eliminate the need to switch between Defender XDR and Microsoft Sentinel portals, now having a single pane of glass, which the team has been wanting for some years.\u201d<\/span><span data-ccp-props=\"{}\">&nbsp;<\/span><\/em><\/p>\n<p><em><strong><span data-contrast=\"auto\">Robel Kidane, Group Information Security Manager, Renishaw PLC<\/span><span data-ccp-props=\"{&quot;335572071&quot;:4,&quot;335572072&quot;:1,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:4,&quot;335572076&quot;:4,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:4,&quot;335572080&quot;:1,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:4,&quot;335572084&quot;:4,&quot;335572085&quot;:4278190080,&quot;469789798&quot;:&quot;single&quot;,&quot;469789802&quot;:&quot;single&quot;,&quot;469789806&quot;:&quot;single&quot;,&quot;469789810&quot;:&quot;single&quot;}\">&nbsp;<\/span><\/strong><\/em><\/p>\n<\/blockquote>\n<p><span data-contrast=\"auto\">Unifying threat protection, exposure management and security analytics capabilities in one pane of glass not only streamlines the user experience, but also enables Sentinel customers to realize security outcomes more efficiently:<\/span><span data-ccp-props=\"{}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong><span data-contrast=\"auto\">Analyst efficiency<\/span><\/strong><span data-contrast=\"auto\">: A single portal reduces context switching, simplifies workflows, reduces training overhead, and improves team agility.<\/span><span data-ccp-props=\"{}\">&nbsp;<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong><span data-contrast=\"auto\">Integrated insights<\/span><\/strong><span data-contrast=\"auto\">: SOC-focused case management, threat intelligence, incident correlation, advanced hunting, exposure management, and a prioritized incident queue enriched with business and sensitivity context\u2014enabling faster, more informed detection and response across all products.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\"><strong>SOC optimization<\/strong>:<\/span><span data-contrast=\"auto\"> Security controls that can be adjusted as threats and business priorities change to control costs and provide better coverage and utilization of data, thus <\/span><a class=\"lia-external-url\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/soc-optimization\/soc-optimization-access?tabs=defender-portal\" target=\"_blank\" rel=\"noopener noreferrer\">maximizing ROI from the SIEM<\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Microsoft is committed to supporting every single customer in <\/span><a class=\"lia-external-url\" href=\"https:\/\/learn.microsoft.com\/azure\/sentinel\/move-to-defender\" target=\"_blank\" rel=\"noopener noreferrer\">making that transition<\/a><span data-contrast=\"auto\"> over the next 12 months. Beginning July 1, 2026, Sentinel <\/span><span data-contrast=\"auto\">users will be automatically redirected to the Defender portal.<\/span><span data-ccp-props=\"{}\">&nbsp;<\/span><\/p>\n<p>After helping thousands of customers smoothly make the transition, we recommend that security teams begin planning their migration and change management now to ensure continuity and avoid disruption. While the technical process is very straightforward, we have found that early preparation allows time for workflow validation, training, and process alignment to take full advantage of the new capabilities and experience.<\/p>\n<p><span>1.<em> Leverage Microsoft\u2019s help<\/em>:<\/span><\/p>\n<p><span data-contrast=\"auto\">Leverage <\/span><a class=\"lia-external-url\" href=\"https:\/\/learn.microsoft.com\/en-us\/unified-secops-platform\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft documentation<\/a><span data-contrast=\"auto\">, <\/span><a class=\"lia-external-url\" href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.youtube.com%2Fplaylist%3Flist%3DPL3ZTgFEc7Lyska6WLWBzc8sob-kYA2jPj&amp;data=05%7C02%7Ccsatish%40microsoft.com%7Cc219b9e1b8fb4d7a5ece08dda990041e%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638853158322245922%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=XuYKw01gGo4IcZdHFc2ACHa9NLOWstdAJJy%2FoAjx8YU%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">instructional videos<\/a><span data-contrast=\"auto\">, <\/span><a class=\"lia-external-url\" href=\"https:\/\/learn.microsoft.com\/en-us\/unified-secops-platform\/microsoft-sentinel-onboard\" target=\"_blank\" rel=\"noopener noreferrer\">guidance<\/a><span data-contrast=\"auto\">, and in-product support to help you be successful. A good starting point is the documentation on <\/span><a class=\"lia-external-url\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/sentinel\/move-to-defender\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Learn<\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">2.&nbsp;<em>Plan early<\/em>:<\/span><\/p>\n<p>Engage stakeholders early including SOC and IT Security leads, MSSPs, and compliance teams to align on timing, training and organizational needs. Make sure you have an actionable timeline and agreement in the organization around when you can prioritize this transition to ensure access to the full potential of the new experience.<\/p>\n<p><span data-contrast=\"auto\">3. <em>Prepare your environment:<\/em><\/span><\/p>\n<p>Plan and design your environment thoroughly. This includes understanding the prerequisites for onboarding Microsoft Sentinel workspaces, reviewing and deciding on access controls, and planning the architecture of your tenant and workspace. Proper planning will ensure a smooth transition and help avoid any disruptions to your security operations.<\/p>\n<p><span data-contrast=\"auto\">4. <em>Leverage Advanced Threat Detection:<\/em><\/span><\/p>\n<p>The Defender portal offers enhanced threat detection capabilities with advanced AI and machine learning for Microsoft Sentinel. Make sure to leverage these features for faster and more accurate threat detection and response. This will help you identify and address critical threats promptly, improving your overall security posture.<\/p>\n<p><span data-contrast=\"auto\">5. <em>Utilize Unified Hunting and Incident Management:<\/em><\/span><\/p>\n<p>Take advantage of the enhanced hunting, incident, and investigation capabilities in Microsoft Defender. This provides a comprehensive view for more efficient threat detection and response. By consolidating all security incidents, alerts, and investigations into a single unified interface, you can streamline your operations and improve efficiency.<\/p>\n<p><span class=\"lia-media-object lia-media-is-center lia-media-size-default\" data-image-alt><button class=\"lia-media-unstyled-btn\" type=\"button\" aria-haspopup=\"true\" aria-label=\"Enlarge Image\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLXZPd2J6NQ?image-dimensions=999x562&amp;revision=4\" width=\"999\" height=\"562\" alt><\/button><\/span><\/p>\n<p><span data-contrast=\"auto\">6. <em>Optimize Cost and Data Management<\/em><\/span><\/p>\n<p>The Defender portal offers cost and data optimization features, such as SOC Optimization and Summary Rules. Make sure to utilize these features to optimize your data management, reduce costs, and increase coverage and SIEM ROI. This will help you manage your security operations more effectively and efficiently.<\/p>\n<p><span class=\"lia-media-object lia-media-is-center lia-media-size-default\" data-image-alt><button class=\"lia-media-unstyled-btn\" type=\"button\" aria-haspopup=\"true\" aria-label=\"Enlarge Image\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLVJyY2ptNw?image-dimensions=999x554&amp;revision=4\" width=\"999\" height=\"554\" alt><\/button><\/span> <\/p>\n<p>The unified SecOps experience available in the Defender portal is designed to support the evolving needs of modern SOCs. The Defender portal is not just a new home for Microsoft Sentinel &#8211; it\u2019s a foundation for integrated, AI-driven security operations.<\/p>\n<p>We\u2019re committed to helping you make this transition smoothly and confidently. If you haven\u2019t already joined the thousands of security organizations that have done so, now is the time to begin.<\/p>\n<p> READ MORE <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-custo\/4428613\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is transitioning Microsoft Sentinel into the Microsoft Defender portal to create a unified security operations experience.<br \/>\nThe post Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0 appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-58910","post","type-post","status-publish","format-standard","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-01T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0\",\"datePublished\":\"2025-07-01T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/\"},\"wordCount\":1024,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techcommunity.microsoft.com\\\/t5\\\/s\\\/gxcuf89792\\\/images\\\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/\",\"name\":\"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techcommunity.microsoft.com\\\/t5\\\/s\\\/gxcuf89792\\\/images\\\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4\",\"datePublished\":\"2025-07-01T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/techcommunity.microsoft.com\\\/t5\\\/s\\\/gxcuf89792\\\/images\\\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4\",\"contentUrl\":\"https:\\\/\\\/techcommunity.microsoft.com\\\/t5\\\/s\\\/gxcuf89792\\\/images\\\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/","og_locale":"en_US","og_type":"article","og_title":"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-07-01T17:00:00+00:00","og_image":[{"url":"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0","datePublished":"2025-07-01T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/"},"wordCount":1024,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/","url":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/","name":"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4","datePublished":"2025-07-01T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/#primaryimage","url":"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4","contentUrl":"https:\/\/techcommunity.microsoft.com\/t5\/s\/gxcuf89792\/images\/bS00NDI4NjEzLUpTMTk1Wg?image-dimensions=999x545&amp;revision=4"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-customers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58910"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58910\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}