Eviden's Microsoft Sentinel CSI Engagement 5 WK Workshop

Eviden International France - SAS

Increase the security of your Microsoft Cloud with our workshop. We deploy Microsoft 365 trial lic, configure Security tools, and conduct threat exploration to discover and mitigate threats actively.

Microsoft Sentinel Value Insights Workshop

As IT becomes more strategic, the importance of security grows daily. Security information and event management (SIEM) solutions built for yesterday’s environments struggle to keep pace with today’s challenges - let alone tomorrow’s unimagined risks.

Empower your security strategy with our "Microsoft Sentinel Value Insights" workshop to equip your Microsoft cloud environment with intelligent security analytics and threat intelligence.

In Scope:

  • Deployment of Microsoft 365 trial licenses
  • Configuration of Microsoft 365 Security tools according to the delivery guide for Value Insights
  • Threat exploration to discover threats actively attacking the customer
  • Mapping threats discovered to a recommended method of mitigation 

Out of Scope:

  • Incident Response
  • PoC or Lab Deployment
  • Deep analysis
  • Configuration of Microsoft 365 Security tools beyond the guidance of Value Insights
  • Forensic Analysis

Microsoft Services:

  • Microsoft Sentinel
  • Azure Active Directory Identity Protection
  • Defender for Office 365
  • Microsoft Defender for Cloud Apps 

What to Expect:

  • Discovering threats to your Microsoft 365 cloud and on-premises environments across email, identity, and data.
  • Understanding how to mitigate threats by showing how Microsoft 365 and Azure security products can help mitigate and protect against threats that are found.
  • Planning next steps and provided information to build a business case for a production deployment of Microsoft Sentinel, including a technical deployment roadmap.

Five-Week Schedule:

  • Week 1: Alignment of expectations, general scope, and scheduling. Analyse SIEM deployment requirements and priorities.
  • Week 2: Kick-Off, definition of scope & deployment of Microsoft Sentinel in your production environment.
  • Week 2-4: Limited remote monitoring, proactive threat hunting (2 hours/week), threat discovery, and automation demonstrations.
  • Week 5: Next steps for a joint production implementation of Microsoft Sentinel. 

Value Insights Highlights:

  • Understand the features and benefits of Microsoft Sentinel.
  • Gain visibility into threats across email, identity, and data.
  • Better understand, prioritize, and mitigate potential threat vectors.
  • Create a defined deployment roadmap based on your environment and goals.
  • Develop joint plans and next steps for an enhanced security posture.
https://store-images.s-microsoft.com/image/apps.28494.6c7ff971-3bac-43cf-b65c-eebb586942e5.4e46d261-da1a-4001-80e3-caf32dbbfb61.66aa31d9-fce7-42e1-a5a0-50355642e30d
https://store-images.s-microsoft.com/image/apps.28494.6c7ff971-3bac-43cf-b65c-eebb586942e5.4e46d261-da1a-4001-80e3-caf32dbbfb61.66aa31d9-fce7-42e1-a5a0-50355642e30d
https://store-images.s-microsoft.com/image/apps.20651.6c7ff971-3bac-43cf-b65c-eebb586942e5.6450eb77-eaad-44a6-a93d-75291d835d4b.a844598d-274e-4c09-9aff-030181ec5f76
https://store-images.s-microsoft.com/image/apps.14706.6c7ff971-3bac-43cf-b65c-eebb586942e5.6450eb77-eaad-44a6-a93d-75291d835d4b.02a0d5c9-60a9-499d-b51f-e9cb2a33f37b
https://store-images.s-microsoft.com/image/apps.20983.6c7ff971-3bac-43cf-b65c-eebb586942e5.6450eb77-eaad-44a6-a93d-75291d835d4b.7b47de53-33ff-4b88-982b-fd6785f5087b
https://store-images.s-microsoft.com/image/apps.35118.6c7ff971-3bac-43cf-b65c-eebb586942e5.3a10d656-f60f-4eda-95c5-297334264841.7850ac49-9625-433b-b3aa-de72093f0a02