3.3. Describe security capabilities of Microsoft Sentinel