Monitor and detect security threats across your Office 365 and Active Directory Environments Now!
Sentinel can be used to modernise your security operations, you’ll often hear the term SoC (Security Operations Centre) which sounds daunting, however you can start with some small actions and greatly improve you security with just a few actions.
Let’s start with some key points to explain more about Sentinel, our approach and what’s involved in this no obligations free proof of concept…
To keep our effort down and your risk low we will start by keeping things small, we’ll setup your SIEM install to ingest data from:
These two sources work well together and should start to provide some interesting information.
We’ll ensure you’re able to understand and use the Sentinel SIEM user portal to:
Sentinel is Microsoft’s Security Event and Incident Management (SIEM) offering, it takes security telemetry from almost any source and using scheduled analytics rules to inspect the security telemetry for suspicious events.
SIEM solution feature normally include:
Many vendors of SIEM solutions and they’re becoming an increasingly popular approach to coordinating large amounts of data and also security solutions such as
Sentinel includes several ways of detecting
An example of security telemetry would be your Azure or on-premise Active Directory sign-in logs which show details such as failures, successes, IP addresses, locations and services accessed and authentication methods.
There are many examples of a suspicious events, some good examples are:
1) multiple failed sign in’s followed by a success which may indicate a successful brute force attack
2) a user account being used to successfully sign in at significantly different locations within a shit time frame possible indicating what’s known as ‘impossible travel’.
Look at Sentinel as the hub of your security architecture, it will ingest and orchestrate solutions such as:
Anything you want really, but let’s start with some examples:
This will be a short project which will explain the many Sentinel benefits, we will also provide upskilling to ensure you understand the service, we’ll then perform the install and you can suddenly benefit from a more comprehensive and centralised view of your security events.
In summary:
A Sentinel MITRE ATT&CK rule may detect events and identify them as connected (read this great article) we can now use Sentinel to trigger automations such as:
A Sentinel MITRE ATT&CK rule may detect events and identify them as connected (read this great article) we can now use Sentinel to trigger automations such as:
No, the solution is hosted within your own Azure subscription
We’re more than happy to answer any concerns during during the pilot phase as long as time is kept to a reasonable amount.
If it’s agreed something of serious concern is occurring then we can help, charges would be at our normal professional service rate.