atech.cloud
Open in
urlscan Pro
2606:4700:20::681a:206
Public Scan
Submitted URL: https://cda.ms/3vf
Effective URL: https://atech.cloud/resources/why-should-azure-sentinel-be-your-first-choice-for-a-siem/?WT.mc_id=m365-0000-rotrent
Submission: On December 24 via manual from MX — Scanned from DE
Effective URL: https://atech.cloud/resources/why-should-azure-sentinel-be-your-first-choice-for-a-siem/?WT.mc_id=m365-0000-rotrent
Submission: On December 24 via manual from MX — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Home * Cloud Solutions CLOUD SOLUTIONS * Cloud Solutions CONSULTANCY * Cloud Solutions MIGRATION * Cloud Solutions HOSTED DESKTOP * Cloud Solutions VCIO SERVICES View All * Microsoft Experts MICROSOFT EXPERTS * Microsoft Experts ADVANCED SPECIALIZATION * Microsoft Experts IDENTITY * Microsoft Experts COMPLIANCE * Microsoft Experts SECURITY View All * Managed Services MANAGED SERVICES * Managed Services SECURITY * Managed Services INFRASTRUCTURE * Managed Services END USER COMPUTE View All * Case Studies * Why Atech * Resources RESOURCES Latest eGuides * eGuide DIGITAL TRANSFORMATION FOR FINANCIAL SERVICES * eGuide ACHIEVE ROI FROM YOUR CLOUD SPEND * eGuide DIGITAL TRANSFORMATION FOR NFPS View All Contact Us Client Login * * * Privacy policy * T&Cs Menu Menu * Cloud Solutions * Microsoft Experts * Managed Services * Why Atech * More Contact Us Client Login How to build a Modern Workplace in FinServ Modern Workplace All Resources Digital transformation for NFPs Blog WHY MICROSOFT SENTINEL SHOULD BE YOUR FIRST CHOICE FOR A SIEM Security In the world of cybersecurity, the most important aspect that a Security Operations Center (SOC) depends upon is the ‘detection of attack.’ Detection leads to informing the team that something unusual or malicious is happening and it should be prevented. Detections come in the form of an ‘Incident’ and the tool used for incident management is called a SIEM (Security Information and Event Management). There are many different SIEM providers in the market that provide a wide array of different functionalities, a few popular ones include Splunk, QRadar, ArcSight, LogRhythm. But in this article, we will explore the first and to date the only cloud-based SIEM – Microsoft Sentinel! Sentinel is Microsoft’s cloud-native SIEM solution that gets deployed in an organisation’s Azure tenant and accessed via the Azure portal, ensuring alignment with pre-existing organisational policies. The ability to leverage elastic compute and storage capabilities inherent in Azure for data-intensive applications such as SIEM is a significant advantage over premise-based log analysis solutions. Additionally, Microsoft Sentinel can make use of infrastructure as a service (IaaS) and platform as a service (PaaS) available in Azure to deliver capabilities like workflow automation and long-term log retention that are typically provided as add-on services from other SIEM providers. The unified integration capabilities of Microsoft Sentinel have created a buzz in the security industry where it integrates with Microsoft 365 Defender and Microsoft Defender to provide a unified way to manage risk in your digital landscape under a single umbrella. Incidents, schema, and alerts can be shared between Microsoft Sentinel and Microsoft 365 Defender, providing a holistic view with seamless drill-down for context. Let us take a deep dive into the world of Microsoft Sentinel and try to understand why should Sentinel be your first choice for a SIEM. SIMPLIFYING LOGS Logs are an integral part of any organisation’s infrastructure. SIEMs cannot practically perform without logs. And thus, the first deployment prerequisite of Microsoft Sentinel is Log Analytics Workspace (LAW), where all ingested data or logs will be stored. With Log Analytics deployed, the Microsoft Sentinel resource is available for configuration to perform the SIEM functions. The process of connecting Microsoft Sentinel with a LAW only requires a few clicks because it has a friendly UI. Once connected, Microsoft Sentinel also offers you a wide variety of log categories to choose from to ensure you are ingesting only the data relevant to your needs. Microsoft Sentinel provides you with a highly scalable connection with the LAW to adjust the data ingestions feasibly. UNIFIED DATA COLLECTOR We often encounter a common misconception among security executives and practitioners that Microsoft Sentinel can only be used for Azure Cloud resources. In fact, Microsoft Sentinel can be successfully used to ingest and correlate data from a wide range of log sources located in a variety of cloud platforms (Azure, AWS, and Google Cloud), on-premises network and compute infrastructure, 3rd party security tools (including firewalls), or software as a service (SaaS) applications. Microsoft Sentinel includes more than 100 data connectors, out of the box, with the ability to create custom sources to meet individual requirements. In addition to those, the Microsoft Sentinel community is regularly demonstrating new use cases and data connectors that expand the capabilities of the solution. MICROSOFT SENTINEL IS A SOAR TOO The main engine behind the Microsoft Sentinel automation capability is Azure Logic Apps. In terms of cybersecurity, this capability is called Security Orchestration and Automated Response (SOAR). Azure Logic Apps power “playbooks” and are, effectively, a sequence of procedures that can be run in response to a security alert. Playbooks can help automate and orchestrate response actions that would typically be undertaken by security analysts. These can be triggered manually or set to run automatically when specific alerts are triggered. Additionally, automation rules allow for a more intuitive construction of SOAR activities, providing the ability to build combinations of playbook runs and incident updates (severity, ownership, status etc.) to match the required output. FOR THE LOVE OF DASHBOARDS The Microsoft Sentinel workbooks provide a wide range of data visualisation capabilities based on KQL queries and integration with additional Microsoft resources (via REST APIs). Over 100 workbook templates are provided for the typical log sources such as Azure Active Directory, Office 365, Windows Active Directory, and third-party log sources (e.g., firewalls, SaaS). The workbooks provide several visualisation controls (bar, pie, area, time charts), conditional formatting, and several other features commonly found in analytical platforms. Through regular review and feedback from the consumer reports, workbooks can become highly effective tools. POWER OF THREAT INTELLIGENCE Within a SIEM solution like Microsoft Sentinel, the most used form of TI is threat indicators, also known as Indicators of Compromise (IoCs). Threat indicators are data that associate observed artefacts such as URLs, file hashes, or IP addresses with known threat activity such as phishing, botnets, or malware. In Microsoft Sentinel, you can use threat indicators to help detect malicious activity observed in your environment and provide context to security investigators to help inform response decisions. The most important use case for threat indicators in Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organisation. WHY ATECH Now that you know about the exceptional features of Microsoft Sentinel, let us understand how Atech will implement and leverage these features for improving your organisation’s security: * As security researchers we are continuously working on improving Threat Intelligence of our customers by adding and updating the IoCs from various trusted security forums that help prevent attacks from the new vulnerabilities in the market. * Our security analysts design and implement custom analytical rules that involve various MITRE techniques and tactics to improve the efficiency and speed of attack detections. * We provision custom workflow automation or playbooks (organisation specific) to automate the response actions per incident type and effectively reduce the MTTR (Mean Time To React). * We proactively look for security threats across your organisation’s data sources by developing advanced hunting queries that give us an early insight into events that may indicate if a compromise is in process or highlight vulnerable areas in your environment. Additionally, we provide monthly and quarterly security reports that summarise the incidents over time and display improvements in your organisation’s security posture. For anyone interested in improving their security posture, the security baseline assessment would be a good place to start. Contact our team to learn more. Yash Mudaliar, Cloud Security Engineer AS BUSINESS PRIORITIES SHIFTED, WE PIVOTED. TRUST ATECH FOR YOUR FUTURE-READY TECHNOLOGY. CONTACT US * Home * Cloud Solutions * Microsoft Experts * Managed Services * Case Studies * Why Atech * Resources Contact Us Client Login Privacy policy T&Cs Social Responsibility Disclaimer RESOURCES Be a part of the conversation. Better tech enables better insights. Learn about cloud services, managed security, and discover the incredible potential of Microsoft at the heart of your organisation with updates and expertise from Atech. New Blog PREPARE FOR BATTLE – HOW CAN YOU PROTECT AGAINST LOG4J? Security DIGITAL TRANSFORMATION FOR FINANCIAL SERVICES ACHIEVE ROI FROM YOUR CLOUD SPEND Cookie policy This site uses cookies. For more information visit our Privacy Policy AcceptReject Manage consent Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the ... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. Functional Functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. Performance Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. Analytics Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Advertisement Advertisement Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads. Others Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. SAVE & ACCEPT