Sentinel Hunter (Database Stage)

I built Sentinel Hunter to solve a critical blind spot: enterprise organizations running Azure and Microsoft 365 often have no clear visibility into their actual infrastructure, security posture, and compliance status. Most companies inherit complex, poorly documented environments from previous IT leadership, migrations, or vendor implementations—and they have no idea what they're actually running or how exposed they are.

What I Built:

I engineered Sentinel Hunter, a comprehensive audit and exposure assessment tool that crawls through enterprise Azure subscriptions and Microsoft 365 tenants to map, document, and expose the complete infrastructure landscape. The tool automatically discovers:

  • Azure Infrastructure: VMs, storage accounts, databases, networking, app services, function apps, and all resource configurations

  • Microsoft 365 Configuration: User accounts, licenses, security policies, MFA enforcement, conditional access rules, data loss prevention (DLP) policies, and sharing settings

  • Security Posture: Misconfigured resources, overly permissive access controls, disabled security features, unpatched systems, and compliance gaps

  • Identity & Access Management: Role assignments, service principals, app registrations, and privilege escalation risks

  • Data Exposure: Publicly accessible storage, unencrypted databases, oversharing in Teams/SharePoint, and sensitive data in wrong locations

Sentinel Hunter generates a detailed, executive-ready report that shows exactly what's running, where the vulnerabilities are, and what needs immediate attention.

Who This Serves:

I built Sentinel Hunter for enterprise organizations and their IT leadership who need:

  • CIOs and IT Directors who inherited complex environments and need a complete infrastructure inventory

  • Security teams conducting compliance audits, penetration testing, or security assessments

  • Managed Service Providers (MSPs) taking over new enterprise clients and need to understand what they're managing

  • Enterprise IT teams preparing for security incidents, audits, or migrations

  • Organizations undergoing compliance reviews (SOC 2, ISO 27001, HIPAA, PCI-DSS) and need to prove their security controls

  • Companies that have experienced security breaches and need to understand their exposure

Why I'm the Only One Doing This:

Most Azure and M365 audit tools focus on compliance checklists or security best practices—they tell you what you should be doing. I built Sentinel Hunter to do something different: show you what you're actually doing, expose the gaps, and present it in a way that non-technical stakeholders can understand.

I'm the only provider offering a comprehensive, automated tenant infrastructure exposure assessment that combines Azure and Microsoft 365 visibility in one unified report. Most competitors either focus on Azure alone, M365 alone, or provide generic compliance templates. I've built the hard part—the actual discovery, correlation, and risk analysis across both platforms.

Sentinel Hunter doesn't just list problems; it contextualizes them. It shows relationships between resources, identifies cascading risks, and prioritizes what needs immediate attention versus what can be addressed in a roadmap.

The Build:

Sentinel Hunter leverages:

  • Azure Resource Manager APIs to enumerate all resources, configurations, and access controls

  • Microsoft Graph API to audit Microsoft 365 users, licenses, security policies, and sharing settings

  • Custom risk analysis engine that correlates data across platforms to identify exposure chains

  • Automated compliance mapping against industry standards (SOC 2, ISO 27001, HIPAA, PCI-DSS)

  • Executive reporting with clear visualizations, risk scoring, and remediation recommendations

The assessment runs in hours (not weeks), and the output is immediately actionable—no IT jargon, no fluff, just clear visibility into what's exposed and why it matters.

Typical Findings:

Clients typically discover:

  • Hundreds of unused resources consuming budget

  • Storage accounts and databases publicly accessible to the internet

  • Overly permissive role assignments (e.g., Owner roles on subscriptions)

  • Disabled MFA on critical accounts

  • Unencrypted sensitive data in SharePoint or Teams

  • Shadow IT apps and service principals with excessive permissions

  • Compliance policy gaps that put the organization at regulatory risk

Pricing & Engagement:

Sentinel Hunter is a professional services engagement, not a self-service tool. I work directly with enterprise IT teams to:

  1. Scope the audit (which subscriptions, tenants, and risk areas to focus on)

  2. Execute the discovery and analysis

  3. Present findings in an executive briefing

  4. Provide a detailed remediation roadmap

Pricing is based on tenant complexity and scope. Typical engagements range from $5K–$25K depending on the size and complexity of the environment.

Support & Follow-Up:

I provide:

  • Executive presentation of findings

  • Detailed technical documentation for IT teams

  • Remediation roadmap with prioritization

  • Optional follow-up assessments to track progress

Sentinel Hunter represents my answer to a critical gap in enterprise IT: most organizations have no idea what they're actually running in Azure and Microsoft 365, and that lack of visibility is a massive security and compliance risk. I built Sentinel Hunter to give enterprises the clarity they need to take control of their infrastructure.