Mike! Mike! Mike!
What day is it?
Its Security Day with Mike!

Cyber threats are evolving, and staying ahead requires the right tools, strategies, and knowledge.
-
How to Create Custom Sentinel Analytic Rules
By Mike – Security Day Blog – This post will explain the importance of developing Sentinel rules for modern security systems. 👋 Introduction: Sentinel Rule Building Can Be…
4 min read
-
Exploit SIEM Synergy: Supercharge Azure Sentinel Now
Introduction In today’s sprawling security ecosystems, many organizations run parallel SIEMs. They use a legacy platform to handle traditional infrastructure. Alongside this, they use Microsoft Sentinel to watch…
4 min read
-
The Unfiltered Truth: How to Slash Sentinel Costs by Curating Log Chaos
Drowning in logs? You’re not alone. When on-premise systems spew unfiltered telemetry into Microsoft Sentinel, you end up with bloated dashboards, noisy detections, and a hemorrhaging Azure bill.…
4 min read
-
Demystifying Uncommon Log Sources into Microsoft Sentinel: What You Need to Know (with Real Client Examples + Code)
Microsoft Sentinel provides native connectors for many popular services. However, when your environment includes custom-built applications, legacy systems, or niche appliances, you’ll often need to step outside of…
4 min read
-
Why Microsoft Sentinel Complements Your Current SIEM
Client Security teams often ask me the same question when Microsoft Sentinel comes up: “Why would we use Sentinel? We already have a SIEM.” It’s a fair question—especially…
4 min read
-
What to Focus on First with Microsoft Sentinel
Mike! Mike! Mike! What day is it? Its Security with Mike! One of the most critical components of any security organization is a functional SIEM—one that delivers the…
4 min read