Mike! Mike! Mike!
What day is it?
Its Security Day with Mike!

Cyber threats are evolving, and staying ahead requires the right tools, strategies, and knowledge.
-
đĄď¸Â Commanding the Chaos: Lifting Off with Microsoft Security Copilot
đ Welcome to Our Security Copilot Blog Series! Weâre excited to launch Commanding the Chaos, a 6-week blog series designed to help you unlock the full potential of Microsoft Security…
4 min read
-
How to Create Custom Sentinel Analytic Rules
By Mike â Security Day Blog – This post will explain the importance of developing Sentinel rules for modern security systems. đ Introduction: Sentinel Rule Building Can Be…
4 min read
-
Exploit SIEM Synergy: Supercharge Azure Sentinel Now
Introduction In todayâs sprawling security ecosystems, many organizations run parallel SIEMs. They use a legacy platform to handle traditional infrastructure. Alongside this, they use Microsoft Sentinel to watch…
4 min read
-
The Unfiltered Truth: How to Slash Sentinel Costs by Curating Log Chaos
Drowning in logs? Youâre not alone. When on-premise systems spew unfiltered telemetry into Microsoft Sentinel, you end up with bloated dashboards, noisy detections, and a hemorrhaging Azure bill.…
4 min read
-
Demystifying Uncommon Log Sources into Microsoft Sentinel: What You Need to Know (with Real Client Examples + Code)
Microsoft Sentinel provides native connectors for many popular services. However, when your environment includes custom-built applications, legacy systems, or niche appliances, youâll often need to step outside of…
4 min read
-
Why Microsoft Sentinel Complements Your Current SIEM
Client Security teams often ask me the same question when Microsoft Sentinel comes up: âWhy would we use Sentinel? We already have a SIEM.â It’s a fair questionâespecially…
4 min read





