Azure Sentinel SIEM

Jan 9, 2024

Microsoft Sentinel Data Segregation Options

So, you want to segregate your data in Sentinel? Well, you came to the right place! In this blog we are going to review four different ways that you can segregate data in Microsoft Sentinel. Keep in mind that there are pros and cons to every segregation option and that the best choice for your […]

Read More
Microsoft Sentinel Data Segregation Options
Jan 4, 2024

Complex Sentinel Deployments Using ARC and AMA Over Private Links and Private Endpoints

Large organizations sometimes opt for an architectural choice to use private links and private endpoints in the context of ingesting data from on-premise servers into Microsoft Sentinel. The typical reasons for this choice includes: Alignment with existing Azure architecture where solutions connecting datacenter to cloud such as ExpressRoute, or Azure VPN gateways are already adopted […]

Read More
Complex Sentinel Deployments Using ARC and AMA Over Private Links and Private Endpoints
Aug 31, 2023

Maximizing the Value of Azure Automation for SOCs

A BlueVoyant Custom Levenshtein Detection What Does This Detection Mitigate?  This use case has been designed to capture email spoofing attempts from an external attacker where the attacker impersonates an internal user or trusted supplier. As domain verification is not built into the Simple Mail Transfer Protocol (SMTP), attackers can counterfeit email addresses with the […]

Read More
Maximizing the Value of Azure Automation for SOCs
Jul 25, 2023

Microsoft Sentinel Design - Updated One-Page Diagram

Microsoft Sentinel has introduced a significant number of new features and improvement of existing ones since our last diagram update. Some notable ones are increased incident management options, addition of large number of solutions including data connectors, detection rules and workbooks, content management options such as Workspace Manager, centralized data collection rules via the Azure […]

Read More
Microsoft Sentinel Design - Updated One-Page Diagram
Aug 25, 2021

Microsoft 365 Defender, Azure Defender, Azure Sentinel One-Page Diagram

In the past we have published individual diagrams for a number of Microsoft cloud security solutions, but in the end we always intended to have the larger picture that can provide analysts with a visual understanding on what type of data is exchanged between various Microsoft security controls and how that data is used to […]

Read More
Microsoft 365 Defender, Azure Defender, Azure Sentinel One-Page Diagram
Aug 3, 2021

Testing With Production Data

The ability to maintain a test SIEM has been a challenge for most SOCs. Test environments are typically inadequate as SOC teams cannot rely on a limited dataset to develop and test new rules and automation. At the same time, organizations maintaining a sizeable up-to-date dataset for a development SIEM instance usually means duplicating logs, […]

Read More
Testing With Production Data
Mar 26, 2021

Azure Sentinel Design Update

Azure Sentinel born-in-the-cloud SIEM was released in preview mode in February 2019 and in full general availability in September 2019, however, it has since advanced in bounds and leaps, doubling the number of data connectors, improving visualizations, incident management and building a rich ecosystem of options for SOAR and data enrichment. Combined with a tight […]

Read More
Azure Sentinel Design Update
Feb 12, 2021

Microsoft Security Stack Coverage

Contact us for full walk-through of this diagram and a review of Microsoft Graph Security integration with the overall Microsoft security stack.

Read More
Microsoft Security Stack Coverage
Nov 29, 2020

Using KQL to Estimate Log Ingestion Volume In Azure Sentinel

Azure Sentinel pricing model is driven by the amount of data ingested for security analytics that is stored in the related Log Analytics workspace. Given the costs of the cloud resources, it is important to be able to estimate future logs space consumption and consider any budget-related implications. Basing the analysis on the past data, […]

Read More
Using KQL to Estimate Log Ingestion Volume In Azure Sentinel
Nov 22, 2020

Microsoft Graph Security Components & API

Microsoft Graph, the Security component was born as a way to represent the threat intelligence information in a form that is closer to the way they attackers approach their targets, as a graph of interconnected systems, with complex relationships between themselves and 3rd party entities. Inside the graph, Microsoft is using their substantial analytical power […]

Read More
Microsoft Graph Security Components & API
Nov 8, 2020

Microsoft 365 Defender for Endpoints

Formerly known as  Defender ATP, Microsoft Defender for Endpoints is now a critical component of Microsoft XDR line of security controls. Defender for Endpoints is starting to go past its newly found fame as the “new kid on the block”, with a meteoric rise in Gartner’s Magic Quadrant for endpoint protection. It is now becoming […]

Read More
Microsoft 365 Defender for Endpoints
Nov 3, 2020

Using Kusto Query Language (KQL) in Azure Sentinel to calculate IIS session times

User sessions are an important aspect of identifying the behavior of web users. In many cases there is a lot of effort on ensuring that a user spends as much time visiting a website as it increase the chance of consuming the services offered by that particular website, be that advertising material, sales, etc. Onboarding […]

Read More
Using Kusto Query Language (KQL) in Azure Sentinel to calculate IIS session times
Page 1 of 3
Back to top
Close