diff --git a/src/assets/images/analytics/azure-portal.png b/src/assets/images/analytics/azure-portal.png
new file mode 100644
index 00000000000000..a6e3447bd51208
Binary files /dev/null and b/src/assets/images/analytics/azure-portal.png differ
diff --git a/src/assets/images/analytics/configuration.png b/src/assets/images/analytics/configuration.png
new file mode 100644
index 00000000000000..23bc647e8ff253
Binary files /dev/null and b/src/assets/images/analytics/configuration.png differ
diff --git a/src/assets/images/analytics/data-connectors.png b/src/assets/images/analytics/data-connectors.png
new file mode 100644
index 00000000000000..910b2c2dfce20a
Binary files /dev/null and b/src/assets/images/analytics/data-connectors.png differ
diff --git a/src/assets/images/analytics/traffic-overview.png b/src/assets/images/analytics/traffic-overview.png
new file mode 100644
index 00000000000000..4270e611d6faca
Binary files /dev/null and b/src/assets/images/analytics/traffic-overview.png differ
diff --git a/src/content/docs/analytics/analytics-integrations/sentinel.mdx b/src/content/docs/analytics/analytics-integrations/sentinel.mdx
index 01558bac718ba6..83c5751ef1dd3f 100644
--- a/src/content/docs/analytics/analytics-integrations/sentinel.mdx
+++ b/src/content/docs/analytics/analytics-integrations/sentinel.mdx
@@ -6,13 +6,294 @@ sidebar:
---
-Microsoft has developed a Cloudflare connector that allows their customers to integrate [Cloudflare Logs](/logs/) with Microsoft Sentinel.
+import { Details } from "~/components";
-## How it works
+Cloudflare has integrations with Microsoft Sentinel to make analyzing your Cloudflare data easier and in a centralized space. Cloudflare has two versions of this connector available. We recommend utilizing the latest Codeless Connector integration as it provides easier setup, cost management, and integrates with [Sentinel Data Lake](https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-lake-overview).
-[Logpush](/logs/logpush/logpush-job/enable-destinations/azure/) sends logs from Cloudflare to Azure Blob Storage. From there, the Cloudflare connector, a Microsoft function, ingests these logs into Azure Log Analytics Workspace, making them available for monitoring and analysis in Microsoft Sentinel.
+**[Sentinel CCF Solution](https://marketplace.microsoft.com/en-us/product/azure-application/cloudflare.azure-sentinel-solution-cloudflare-ccf?tab=Overview)** (recommended): The Codeless Connector Framework (CCF) provides partners, advanced users, and developers the ability to create custom connectors for ingesting data to Microsoft Sentinel.
-
+**[Sentinel Function Based Connector](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cloudflare.cloudflare_sentinel?tab=Overview)**: The Cloudflare connector for Microsoft Sentinel uses [Azure Functions](https://azure.microsoft.com/en-us/products/functions) to process security logs from Cloudflare's Logpush service and ingest them directly into the SIEM platform.
+
+This guide provides clear, step-by-step instructions for integrating Cloudflare logs with the new CCF connector for Microsoft Sentinel using Azure Blob Storage. By following these steps, you will be able to securely collect, store, and analyse your Cloudflare logs within Microsoft Sentinel, enhancing your organisation's security monitoring and incident response capabilities.
+
+## Step 1: Prerequisites
+
+- Azure Subscription with permission to create and manage resources (Contributor/Owner role recommended).
+- Microsoft Sentinel Workspace already set up in your Azure environment.
+- Azure Storage Account with a Blob container for storing Cloudflare logs.
+- Cloudflare Account with access to the domain whose logs you wish to export, and permission to configure Logpush jobs.
+
+## Step 2: Set up a logpush job
+
+1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
+2. Go to **Analytics** > **Logs** and select **Logpush**.
+3. Select **Create Logpush Job**. Choose the log type you want to export (for example, **HTTP requests**).
+4. For the destination, select **Azure Blob Storage**.
+5. Enter your Azure Blob Storage details:
+ - SAS Token (Shared Access Signature)
+
+ To generate a SAS token from the Azure portal, first navigate to your storage account. Under the **Data Storage** section, select **Containers** and choose the relevant container. Within the settings, locate and select **Shared access signature**. Configure the required permissions, such as `write` and `create`, and specify the start and expiration dates for the token. Once configured, generate the SAS token accordingly.
+6. Save and activate the Logpush job.
+
+For complete details, refer to the [Cloudflare Logpush to Azure documentation](/logs/logpush/logpush-job/enable-destinations/azure/).
+
+## Step 3: Configure Azure and deploy the Data Connector in Microsoft Sentinel
+
+1. Log in to the Azure Portal and go to your **Microsoft Sentinel** workspace.
+2. Select **Content Hub** in the navigation bar and search for **Cloudflare**.
+3. Select the **Cloudflare** solution from the results.
+4. Select **Install** in the right pane.
+5. In your **Sentinel workspace**, go to **Data connectors**.
+6. Search for the **Cloudflare connector** (may appear as **Cloudflare (using Azure Blob Storage)**).
+7. Selecte the connector to configure it.
+
+
+
+## Step 4: Fill out required fields
+
+When configuring the Cloudflare data connector, you will need to provide the following information:
+
+- Blob container URL
+
+To obtain the container URL within your Azure storage account, access the Azure Portal and navigate to your storage account. Under **Data Storage**, select **Containers**, then choose the relevant container receiving logs from Cloudflare. The container properties section will display the URL link.
+
+- Resource group name for the storage account
+- Storage account location
+- Subscription ID
+- Event grid topic name (only if reconfiguring; not needed for initial setup)
+
+After entering all information, select **Connect**.
+
+Ensure all fields are correctly filled to enable seamless log ingestion.
+
+
+
+## Step 5: Complete deployment
+
+1. Select **Apply changes** or **Connect** to finalise the connector setup.
+2. Monitor the Data connectors page in Sentinel to confirm that the Cloudflare connector status is **Connected**.
+3. Verify that Cloudflare logs are appearing in your Sentinel workspace under **Log Analytics** > **Logs**.
+4. If logs are not appearing, review your Blob Storage permissions, Cloudflare Logpush configuration, and Sentinel connector settings.
+
+
+
+By following these steps, you have successfully integrated Cloudflare logs with Microsoft Sentinel using Azure Blob Storage. This integration enables advanced security analytics and incident response capabilities for your Cloudflare-protected environments. If you encounter issues, review each configuration step, check permissions, and review Microsoft's official documentation.
+
+
+
+## Supported Logs
+
+We support the following fields to be utilized within the Sentinel Connectors (CCF & Function based). You can push all log fields to Azure using our logpush function as described in [Enable Microsoft Azure](/logs/logpush/logpush-job/enable-destinations/azure/) documentation.
+
+
+
+ClientDeviceType
+Source
+ClientSSLCipher
+ClientTlsCipher
+ClientSSLProtocol
+ClientTlsProtocol
+FirewallMatchesActions
+Event
+FirewallMatchesRuleIDs
+RuleID
+ClientRequestBytes
+ClientBytes
+ClientSrcPort
+ClientPort
+EdgeResponseBytes
+OriginBytes
+BotScore
+BotScoreSrc
+CacheCacheStatus
+CacheResponseBytes
+CacheResponseStatus
+CacheTieredFill
+ClientASN
+ClientCountry
+ClientIP
+ClientIPClass
+ClientRequestHost
+ClientRequestMethod
+ClientRequestPath
+ClientRequestProtocol
+ClientRequestReferer
+ClientRequestURI
+ClientRequestUserAgent
+ClientXRequestedWith
+EdgeColoCode
+EdgeColoID
+EdgeEndTimestamp
+EdgePathingOp
+EdgePathingSrc
+EdgePathingStatus
+EdgeRateLimitAction
+EdgeRateLimitID
+EdgeRequestHost
+EdgeResponseCompressionRatio
+EdgeResponseContentType
+EdgeResponseStatus
+EdgeServerIP
+EdgeStartTimestamp
+FirewallMatchesSources
+OriginIP
+OriginResponseBytes
+OriginResponseHTTPExpires
+OriginResponseHTTPLastModified
+OriginResponseStatus
+OriginResponseTime
+OriginSSLProtocol
+ParentRayID
+RayID
+SecurityLevel
+WAFAction
+WAFFlags
+WAFMatchedVar
+WAFProfile
+WAFRuleID
+WAFRuleMessage
+WorkerCPUTime
+WorkerStatus
+WorkerSubrequest
+WorkerSubrequestCount
+ZoneID
+Application
+ClientMatchedIpFirewall
+ClientProto
+ClientTcpRtt
+ClientTlsClientHelloServerName
+ClientTlsStatus
+ColoCode
+ConnectTimestamp
+DisconnectTimestamp
+IpFirewall
+OriginPort
+OriginProto
+OriginTcpRtt
+OriginTlsCipher
+OriginTlsFingerprint
+OriginTlsMode
+OriginTlsProtocol
+OriginTlsStatus
+ProxyProtocol
+Status
+Timestamp
+ClientASNDescription
+ClientRefererHost
+ClientRefererPath
+ClientRefererQuery
+ClientRefererScheme
+ClientRequestQuery
+ClientRequestScheme
+Datetime
+Kind
+MatchIndex
+OriginatorRayID
+TimeGenerated
+
+
+
+
+
+ClientCountry_s
+ClientDeviceType_s
+ClientIP_s
+ClientIPClass_s
+ClientRequestMethod_s
+ClientRequestProtocol_s
+ClientRequestReferer_s
+ClientRequestURI_s
+ClientRequestUserAgent_s
+EdgePathingOp_s
+EdgePathingSrc_s
+EdgePathingStatus_s
+EdgeResponseContentType_s
+threat
+TimeGenerated
+EdgePathingSrc_s
+EdgePathingOp_s
+EdgePathingStatus_s
+EdgeResponseStatus_d
+OriginResponseStatus_d
+TimeGenerated
+
+
+
+
+
+ClientIPClass
+SrcIpAddr
+ClientRequestURI
+HttpUserAgentOriginal
+HttpRequestMethod
+TimeGenerated
+SrcGeoCountry
+ClientRequestURI
+HttpRequestMethod
+HttpStatusCode
+DstBytes
+SrcBytes
+WAFRuleID
+WAFRuleMessage
+WAFAction
+
+
+
+
+
+TimeGenerated
+HttpStatusCode
+SrcIpAddr
+ClientRequestURI
+ClientTlsStatus
+HttpUserAgentOriginal
+OriginTlsStatus
+NetworkRuleName
+EdgeRequestHost
+SrcGeoCountry
+EdgeResponseStatus
+ClientCountry
+ClientDeviceType
+status
+OriginResponseStatus
+WorkerSubrequest
+http_method
+dest_ip
+dest_host
+uri_path
+http_user_agent
+status
+src_ip
+OriginResponseStatus
+RayID
+WorkerSubrequest
+http_method
+bytes_out
+bytes_cached_requests
+threat
+ClientRequestProtocol
+http_referrer
+ClientIPClass
+cf_http_status_codes
+http_content_type
+cf_http_status_codes
+cached_requests
+CacheCacheStatus
+ClientASN
+EdgePathingSrc
+EdgePathingOp
+EdgePathingStatus
+ClientRequestUserAgent
+SecurityAction
+SecurityRuleID
+SecurityRuleDescription
+
+
+
+## Resources
+
+[Download Cloudflare's CCF Sentinel Solution](https://marketplace.microsoft.com/en-us/product/azure-application/cloudflare.azure-sentinel-solution-cloudflare-ccf?tab=Overview)
+[Microsoft Data Lake Overview](https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-lake-overview)
+[About the CCF Platform](https://learn.microsoft.com/en-us/azure/sentinel/create-codeless-connector)
-For more details, refer to the Microsoft documentation [Cloudflare connector for Microsoft Sentinel](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cloudflare.cloudflare_sentinel).