July 4, 2025July 4, 2025 Modernizing your on-prem SIEM with Microsoft Sentinel – part 2 So you want to migrate your on-prem SIEM to Microsoft Sentinel?What kind of tasks you have thought so far? Some planning maybe?Here are some task what I have in my mind. These are just tasks, no need to do all of them or in that order. This is just a guideline. Also week numbers are adjustable so no need to wait if you have all information to proceed earlier.It might take more or less time. It depends on your environment size and skills of project staff. Table of Contents Some very high level phases (select your own phases) PhaseKey Activities1. Assessment & PlanningInventory, cost modeling, roadmap2. Setup & ConfigurationDeploy workspace, roles, and core connectors3. (Pilot) DeploymentThe hard work 🙂4. Migration ExecutionThe hard work part 2 🙂5.OptimizationParallel run, tuning, SOC training6. DecommissionSwitch over and decommission legacy SIEM 1.Assessment & Planning (Preparation Phase) (Weeks 1-3)Inventory your data sources look from your current setup of on-prem data sources and then add (or decrease) data sources to connect( or to remove) cloud siem Gap analysis between existing SIEM and Sentinel capabilitiesMap retention requirements (e.g., PCI DSS, GDPR) aka how long the ingested data should be storaged.Estimate costs: use Azure Pricing Calculator for data ingestion and storage. NOTE this is only estimation because for example for servers there are Sentinel ingestion discount if you use Defender for Servers P2. To advance about this you need to bring them to Azure by using Azure Arc.Plan architecture:Decide on number of Sentinel workspaces (single vs multi-tenant)Plan RBAC roles and access controls for SOC teams Timeline suggestion for the on-prem migration. SOURCE: jussimetso.com 2.Setup & Configuration (Foundation Phase) (Weeks 4-6)Establish connectivity from on-prem to AzureProvision Azure environment and Microsoft Sentinel workspace(s)Configure Azure Log Analytics workspacesDeploy Sentinel on a Log Analytics workspaceConfigure RBAC roles for Sentinel usage:Owner, Contributor…and SOC tier rolesConnect Microsoft security tools:Entra ID, Microsoft 365, Defender XDR (Identity, Endpoints, Cloud Apps, Office365), PurviewEnable diagnostic logging in Azure resources 3. (Pilot) Deployment (Weeks 7-9)Connect critical data sources (e.g., firewalls, Active Directory) and all other data sources with Sentinel data connectors if availableForward on-premises logs:Install Azure monitor agents for Windows/Linux serversOr onboard them with Azure ArcConfigure Syslog/CEF connectors for firewalls and appliancesNormalize custom data to Sentinel schemas with ASIM parsersImplement baseline for analytics rules and alertsValidate data ingestion, parsing, and correlationConduct end-to-end testing 4. Migration Execution (Weeks 10-13)Review existing on-premises SIEM correlation rulesMap detections to Sentinel analytics rule templatesRebuild custom detection logic using Kusto Query Language (KQL)Validate mappings for:MITRE ATT&CK techniquesAlert severity and SOC triage processesGradually shift remaining data sources to SentinelMigrate existing rules, reports, and alertsImplement automation via Playbooks and SOAR capabilitiesContinuous monitoring and troubleshooting during migration 5. Optimization (Weeks 14-16)Recreate existing automation workflows in Sentinel Playbooks (Logic Apps)Example: auto-ticket creation, notifying Teams/SlackTest playbooks for accuracy and scopeLeverage built-in Sentinel automation rules for enrichment and responseRun Sentinel in parallel with on-prem SIEMCompare alert fidelity and dashboardsFine-tune analytics rules to reduce false positivesPerform test attack scenarios (e.g., simulated phishing, lateral movement)Tune analytics rules, playbooks, and alertsOptimize cost and performance 6. Decommission Legacy SIEM (Weeks 17+)Finalize migration of all critical data sourcesExport and archive historical logs for compliance (if required)Fully transition SOC operations to SentinelRetire or repurpose on-premises SIEM infrastructureRegular training and skill development for analystsContinuous improvement based on feedback and monitoringSchedule periodic assessments and tuning Export historic on-prem log data to AzureOne of the important decisions you make during your migration process is where to store your historical data. To make this decision, you need to understand and be able to compare the various target platforms. Here are some help to do it. Microsoft's guidance for the migration Microsoft have also guidance how to do the migration. You can check it on MS Learn. Microsoft Sentinel migration phases. SOURCE: MS learn There are ready made migration guidance in MS Learn if you are migrating from these services:ArclightSplunkQradarEven if there are not other systems guidance available they all are following the same basic instructions. But I hope that the instructions for SentinelOne, ElasticSearch and LogPoint are coming soon. Jussi Metso Author is a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. Motto: Learning is the key for your future. Share on Social Media x facebook linkedinwhatsapp Discover more from Jussi Metso Subscribe to get the latest posts sent to your email. Type your email… Subscribe SENTINEL #sentinel#siem#soc
SENTINEL Modernizing your on-prem SIEM with Microsoft Sentinel – part 1 June 27, 2025June 27, 2025 Are you wondering to transfer your classic on-prem SIEM to fancy and modernized cloud SIEM. Read my suggestions of the advances of Microsoft Sentinel Read More
SENTINEL Microsoft Sentinel Data lake (preview) August 25, 2025October 17, 2025 “a cloud-native security data platform that centralizes logs and telemetry from across your environment into a scalable, cost-efficient data lake” Read More
SENTINEL Sentinel – New incident experience January 19, 2023January 19, 2023 Table of Contents New incident experience Microsoft Sentinel is your bird’s-eye view across the enterprise… Read More