https://store-images.s-microsoft.com/image/apps.35817.7295388a-7ecb-4c9e-92c7-891e7780853f.02450ce3-41f5-4535-8c1e-1127e2f6c8d3.6693ed1a-42e3-4208-9c69-06fc9094c653

MDE SOC

Var Group

MDE SOC

Var Group

Proactive monitoring on the MDE platform

The Security Operation Center (SOC) is a service, operating twenty-four hours a day, seven days a week: Yarix guarantees the physical, on-site availability of competent technicians at all times. The SOC service makes it possible to:
• Detect, from the first signs, cyber attacks that may compromise the continuity and/or security of the Customer's assets.
• Counter the dangerousness of these attacks, through actions to be agreed with the Customer: direct intervention by Yarix or simple reporting to the Customer’s IT Security.

The main components of the service are listed below:

Event Management - This is the main process of the SOC Service related to the monitoring and management of security events. The core of this process concerns the first classification of security events, which, starting from the identification on the consoles of the technology platforms used, will direct all subsequent actions.

Incident Handling - SOC services defined as “baseline” are complemented by “advanced” SOC services in “ondemand” mode, i.e., exclusively at the explicit request of the Customer.
From this point of view with its CERT that also includes the Incident Response (YIR) team, Yarix is able to address the following activities:
    • Incident Response - when there is a level of compromise affecting a specific system or set of IT systems of the Customer, it becomes necessary to declare that an Information Security Incident is in progress a unit of the Incident Response Team will be involved, which remotely and/or on-site will support the Customer’s internal IT Managers in all phases of incident management.
    • Forensic Analysis - Computer/Mobile Forensics activities involve the acquisition, preservation, data extraction, analysis and presentation of evidence reconstructed and/or recovered from storage systems such as hard drives, external storage devices or from mobile devices.
    • Malware Analysis - in the case of an IT incident related to a malicious vector of unknown nature this service may be activated, which offers the advantage of a clear understanding about the consequences of activating malicious software in one’s systems, through phases of static analysis and dynamic or behaviour analysis.
Phaase I: Scope analysis
The scope consists of the set of Client assets to be protected, both physical (hardware) and intellectual (software and information). The first phase will identify critical assets and business processes that require special attention and the activation of specific controls to detect potentially blocking security anomalies.

Fase II: Definition of the working group
This phase involves the definition of both the Yarix project team and the Client’s business figures in charge of managing the SOC activation project. The figures who will intervene on the Yarix side in the service implementation phase will include:
• SOC Manager: manager of the SOC service
• Service Manager: point of reference for the customer during service delivery
• Technology Specialist Team: supports the customer in the initial deployment phase of the technologies used. It also manages the customization and tuning of the platforms.

Fase III: Definition of the technical solution
The technical solution that Yarix proposes is based on the implementation of technologies useful for detecting threats and security events, in this specific case on the Microsoft Defender for Endpoint solution.
The benefits brought by this solution are many:
• Threat and vulnerability management
• Reduction of the attack surface
• Next-generation protection
• Detection and response from endpoints
• Automated investigation and remediation
• Microsoft Secure Score for devices

Tracking of security-related events is done through a ticketing platform.

Fase IV: The security monitoring service
Yarix technicians are physically present on site twentyfour hours a day, seven days a week: the service is therefore guaranteed H24. Monitoring involves checking for anomalies detected by the technologies installed at the Customer’s perimeter (in order to discard any false positives) and triggering procedures aimed at managing them.

https://store-images.s-microsoft.com/image/apps.35876.7295388a-7ecb-4c9e-92c7-891e7780853f.02450ce3-41f5-4535-8c1e-1127e2f6c8d3.ae34321d-3c4e-4b81-b5a4-4306d18a8f8a
https://store-images.s-microsoft.com/image/apps.35876.7295388a-7ecb-4c9e-92c7-891e7780853f.02450ce3-41f5-4535-8c1e-1127e2f6c8d3.ae34321d-3c4e-4b81-b5a4-4306d18a8f8a