Skip to content

Settings

From the settings page there are three tabs at the top. The tabs allow you to check your current ingestion pricing or commitment tier, the general settings for the Sentinel solution, or access the log analytics workspace Sentinel is added to.

Sentinel pricing

By default, Sentinel is charged on a pay-as-you-go pricing, this means you pay based on consumption for data ingested. You can read more about pricing I have written here, or look at actual prices provided by Microsoft here. You can also go to a commitment tier where you will pay a daily rate up to a certain amount of gigabytes, then a flat rate per GB after that limit. Generally you start to look at these at about ~75GB a day of consumption for cost savings.

The below table illustrates an environment ingesting 175 GB per day based on different pricing models. I am using pricing on February 11th, 2025 for West US 2 for my examples below.

Plan Ingestion Daily cost Price per GB GB Overage Total
Pay-as-you-go 175 GB $0 $4.30 175 GB $752.50
100 GB Commitment Tier 175 GB $296 $2.96 75 GB $518
200 GB Commitment Tier 175 GB $548 $2.74 0 GB $548

Ingestion varies per day, but as you can see, in our scenario where we anticipate ingesting 175 GB per day, the 100 GB tier makes the most cost-effective sense. However if you were ingesting 185 GB per day the next tier could actually make more sense.

Plan Ingestion Daily cost Price per GB GB Overage Total
100 GB Commitment Tier 185 GB $296 $2.96 85 GB $547.60
200 GB Commitment Tier 185 GB $548 $2.74 0 GB $548

Tip

Don't forget to calculate for your potential E5 data grant.

Also these prices are just for analytics logs not auxilliary logs.

Settings

User entity behavior analytics (UEBA)

Note that there is no charge for UEBA, however, it does ingest data into Sentinel which are subject to ingestion pricing. The cost really depends on the environment, but generally I would budget for $5-$50 a month for UEBA. You can utilize the trial if you are concerned about pricing.

UEBA looks at your users, their typical behavior and finds activities or behaviors that are unusual for your users, it can also do correlations across peer groups. These peer groups are based on Security groups, so maybe something is unusual for the user but not uncommon for a user in the same group as the user therefore lowering the suspicious score of the activity.

The UEBA essentially works by selecting the data source you want to monitor identifies for then selecting the data connectors you want to monitor activities for those identities on.

Currently, you can monitor identities from:

  • Active Directory
  • Entra ID

And monitor those identities for activities in:

If you do not have all of the above options available, be sure you have deployed MDI and have all the data sources connected, and you have not connected them recently. You do not need all 6 options checked to benefit from UEBA but the more data you have the better your analytics will be.

Once enabled logs will start to be ingested into the following tables:

  • IdentityInfo
  • BehaviorAnalytics
  • UserAccessAnalytics
  • UserPeerAnalytics

Anomalies

Anomalies are turned on by default, but they do not take action automatically. When enabled and in conjunction with UEBA Microsoft begins to a machine learning model. You can begin to use these anomaly detections within special anomaly analytic rules. When an anomaly is found they are placed in the Anomalies table.

Workspace manager configuration

Workspace manager helps with managing multiple Sentinel workspaces, this could be because your organization has multiple workspaces or because you are an MSSP managing Sentinel workspaces for various customers. I will not be covering this item currently, but will revisit it in the future.

Playbook permissions

If using automation with Playbooks you need to give Sentinel access to those playbooks, even if they are stored in the same resource group as Sentinel. Simply click Configure permissions, find the resource group you wish to give Sentinel access to and hit Apply.

You can view the current permissions or remove existing permissions on Current permissions tab. Alternatively you can go to the resource group and go to the Access control (IAM) section and check Role assignments for the Microsoft Sentinel Automation Contributor role. You should see a service principal listed there. You can also remove the role directly from the resource group.

How do we use your data?

Microsoft automatically opt-ins the Sentinel workspace for analytics allowing engineers to access the data to tune their models. You can opt out if desired from this page.

Auditing and health monitoring

Note that there is no charge for this feature, however, it does ingest data into Sentinel which are subject to ingestion pricing. The SentinelHealth table is free for ingestion but the SentinelAudit is not free for ingestion.

As you go through setting up Sentinel, you will notice that it can be as simple or complex as needed. The best Sentinel setups tend to be complex, even in the simplest Sentinel environments, auditing is an important piece to ensuring you understand changes being made in your environment as well as who made them.

Remove Microsoft Sentinel

Very straightforward, there is detailed information about what to expect when you start the removal process.

Workspace settings

This just takes you to the log analytics workspace Sentinel is attached to, this can be helpful for more advanced tasks, changing workspace data retention settings, or cost caps on the workspace.