Edit

Share via


What is Microsoft Sentinel graph? (Preview)

Microsoft Sentinel graph is a unified graph analytics capability within Microsoft Sentinel that powers graph-based experiences across security, compliance, identity, and the Microsoft Security ecosystem - empowering security teams to model, analyze, and visualize complex relationships across their digital estate.

Unlike traditional tabular data approaches, Sentinel graph enables defenders and AI agents to reason over interconnected assets, identities, activities, and threat intelligence, unlocking deeper insights and accelerating response to evolving cyber threats across pre-breach and post-breach. Graphs natively represent the real-world web of users, devices, cloud resources, data flows, activities, and attacker actions. By representing these relationships as nodes and edges, security teams can answer questions that are difficult or impossible with tables, such as what could happen if a specific user account is compromised? Or what is the blast radius of a compromised document?

Important

Microsoft Sentinel graph is currently in preview. This information relates to a prerelease product that may be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.

Enable defense at all stages

Sentinel graph offers interconnected security graphs to help you at every stage of defense. The graph capabilities are being extended with new scenarios throughout Defender and Microsoft Purview, providing graph-based defense strategies across all stages, from pre-breach to post-breach and across assets, activities, and threat intelligence.

For example, your digital environment includes active directory, servers, virtual machines, and other assets, vulnerabilities, misconfigurations, and excessive privileges are common and can increase the risk of security breaches through compromised accounts. An attacker can infiltrate your organization, compromise tokens, and eventually gain access to sensitive information, resulting in data exfiltration.

Microsoft Sentinel graph offers underlying graph analytics capabilities interconnecting activity, asset, and threat intelligence functionalities, enhancing analysis across these networks and enabling comprehensive graph-based security throughout Microsoft solutions across pre-breach and post-breach.

Diagram showing graph enabled defense capabilities pre-breach and post breach.

  1. Features such as Attack Path within Microsoft Security Exposure Management (MSEM) and Microsoft Defender for Cloud (MDC) provide recommendations to proactively manage attack surfaces, protect critical assets, and explore and mitigate exposure risk.
  2. [New] Blast radius analysis in Incident graph in Defender helps you evaluate and visualize the vulnerable paths an attacker could take from a compromise entity to a critical asset.
  3. [New] Graph-based hunting in Defender helps you visually traverse the complex web of relationships between users, devices, and other entities to reveal privileged access paths to critical assets to prioritize incidents and response efforts.
  4. [New] Activity analysis via Microsoft Purview Insider Risk Management supports user risk assessment and helps you identify data leak blast radius of risky user activity across SharePoint and OneDrive.
  5. [New] Microsoft Purview Data Security Investigations graphs facilitate understanding of breach scope by pointing sensitive data access and movement, map potential exfiltration paths, and visualize the users and activities linked to risky files, all in one view.

Collectively, Microsoft Sentinel graph’s capabilities enable defense across all stages of the security lifecycle.

Integration with Microsoft Security solutions

Microsoft Sentinel graph powers new advanced capabilities across Microsoft's security portfolio:

Solution Capability Description
Microsoft Defender XDR Incident graph extended with Blast Radius Visualize current impact of a breach and the possible future impact in one consolidated graph
Microsoft Defender XDR Hunting graph in Defender Interactively traverse graphs to uncover hidden relationships between assets
Microsoft Purview Data risk graph in Insider Risk Management Map user activities to detect data exfiltration patterns and understand data leak blast radius
Microsoft Purview Data risk graph in Data Security Investigations Trace sensitive data access and movement. Understand data leak blast radius

Get started

To begin using Microsoft Sentinel graph:

  • If you already have the Sentinel data lake, the required graph is auto provisioned when you sign in into the Defender portal. Hunting graph and blast radius experience will appear in the Defender portal.
  • New to data lake? Use the Sentinel data lake onboarding flow to enable the data lake and graph.

Pricing

All new Microsoft Sentinel graph-based experiences are included as part of the existing Defender and Microsoft Purview licenses. However, the Sentinel graph is built upon the Sentinel data lake and requires data sources to be enabled. Enabling data sources incurs ingestion, data processing, and data lake storage costs. For Sentinel SIEM customers, most required data sources are part of Sentinel's Free data sources and are available without charge in the lake after the data is ingested into the Analytics tier. Nonentitled sources such as Microsoft Entra ID logs incur ingestion, data processing, and data lake storage costs if loaded directly into the lake, or Analytics tier ingestion if loaded into the Analytics tier. For more information, see Sentinel data lake billing.