Security Automation Blog

Practical Microsoft Sentinel, Defender XDR, and MISP guides focused on detection engineering, log strategy, and automation.

Browse field-tested walkthroughs on security monitoring architecture, cost optimization, threat intelligence pipelines, and practical detection engineering.

Browse all posts in chronological order

Popular Reads

These are currently the most visited posts on the site.

Curated Topic Clusters

Start here if you want a focused reading path by topic.

Sentinel Cost and Data Strategy

Cost control, retention choices, and data-tier planning for real-world Sentinel operations.

  1. Practical Log Baseline
  2. Cost Estimation Methods
  3. Sentinel Data Lake FAQ
  4. Smart DCRs from Analytics
  5. Threat Modelling and Data Sources

Detection Engineering and XDR Operations

Detection design, custom rule operations, and Defender XDR execution patterns.

  1. Practical Detection Engineering
  2. Custom Detection Rules API
  3. PowerShell Module for CDR
  4. Actions from Advanced Hunting
  5. Sentinel to Defender Migration

MISP and Threat Intelligence Pipelines

Threat intel ingestion, pipeline hardening, and MISP-to-Sentinel implementation patterns.

  1. Push TI from MISP
  2. misp2sentinel Update
  3. RustyMISP2Sentinel
  4. MISP Filter Builder
  5. Upload Indicators API Tool
  6. Threat Intelligence in Detection