Manage and Investigate Risk and Threat Protection
What are BlueVoyant Accelerator Services?
With BlueVoyant’s Microsoft Security Accelerator services, you don’t need to be an expert to take your security and compliance posture to the next level. Our Accelerator services are designed to get you up and running quickly and to maximize your investment in Microsoft with hands-on services that include onboarding and baseline configuration services for the implementation of specific Microsoft Security solutions.
BlueVoyant will perform a detailed analysis of your environment(s) and provide actionable security insights leveraging the BlueVoyant catalog of pre-built playbooks and alert rules. The service includes a detailed assessment of your risks, guidance on how best to leverage Microsoft-powered solutions, and/or deployment and configuration assistance to best meet the requirements of your unique situation. The services are delivered by BlueVoyant Microsoft certified experts who specialize in Microsoft 365 Defender, Microsoft Defender for Cloud, and Microsoft Sentinel.
What does the Microsoft Sentinel Accelerator (BASIC) service include?
Onboarding of the following Microsoft log sources into Microsoft Sentinel are included, as they are free of charge from Microsoft. An additional log source, Azure Active Directory - SignIn logs, is also included. While this log source is billable by Microsoft, it has a low volume.
In addition to the listed Microsoft sources onboarding into Microsoft Sentinel above, you may select up to five (5) additional Log Source Types, as long as they are in the BlueVoyant Data Connectors Library. Types of suggested logs:
Following setup, BlueVoyant will conduct a knowledge transfer exercise related to queries and Azure Functions.
Key Services Delivered:
Why customers choose BlueVoyant
Over 120+ Sentinel deployments, battle-tested processes, and proprietary IP to quickly deploy and configure security solutions.
Increased security and visibility
Powered by our team of security experts, 600+ proprietary alert rules, Threat Intelligence,
Automation and AI capabilities.
Data Privacy and Cost Optimization
Our customers keep data in their own environment, ensuring stronger compliance and reducing cost.