https://store-images.s-microsoft.com/image/apps.51975.f870d0ab-0ab2-46f8-bde2-7faa15a454bb.1f87b4ef-a42d-4006-9d5e-8c3d1e3d6413.50d09e18-9f42-4d94-aad0-2e02ac4ea69c

Maturity Model For Event Log Management M2131

Microsoft Sentinel, Microsoft Corporation

Maturity Model For Event Log Management M2131

Microsoft Sentinel, Microsoft Corporation

Maturity Model For Event Log Management M2131

Note: There may be known issues pertaining to this Solution, please refer to them before installing.

This solution is designed to enable Cloud Architects, Security Engineers, and Governance Risk Compliance Professionals to increase visibility before, during, and after a cybersecurity incident. The solution includes (1) workbook, (4) hunting queries, (8) analytics rules, and (3) playbooks providing a comprehensive approach to design, build, monitoring, and response in logging architectures. Information from logs on information systems1 (for both on-premises systems and connections hosted by third parties, such as cloud services providers (CSPs) is invaluable in the detection, investigation, and remediation of cyber threats. Executive Order 14028, Improving the Nation's Cybersecurity, directs decisive action to improve the Federal Government’s investigative and remediation capabilities. This memorandum was developed in accordance with and addresses the requirements in section 8 of the Executive Order for logging, log retention, and log management, with a focus on ensuring centralized access and visibility for the highest-level enterprise security operations center (SOC) of each agency. In addition, this memorandum establishes requirements for agencies3 to increase the sharing of such information, as needed and appropriate, to accelerate incident response efforts and to enable more effective defense of Federal information and executive branch departments and agencies. For more information, see (💡Improving the Federal Government’s Investigative and Remediation Capabilities Related to Cybersecurity Incidents (M-21-31)).

Workbooks: 1, Analytic Rules: 8, Hunting Queries: 4, Playbooks: 3

Learn more about Microsoft Sentinel | Learn more about Solutions