Microsoft Azure Sentinel 4-Week Workshop
A workshop allowing you to experience “Azure Sentinel” a combination of SIEM and SOAR solution powered by the built-in AI, analytics and automation with an ability to write the custom alerts
Cloud4C- Microsoft Azure Sentinel 4 Week Workshop A VIRTUAL, VIGILANT WATCHER FOR YOUR ENTERPRISE A workshop allowing you to experience “Azure Sentinel” a combination of security information event management (SIEM) and security orchestration automated response (SOAR) solution powered by the built-in AI, analytics and automation with an ability to write the custom alert rules and automated playbooks to find threats in your environment in real time Cloud4C brings you the best of both the worlds: Traditional + AI & M/L Tools & Cloud Native Environment. The use of Cloud Native Security Tools with home grown IP & frameworks helps in delivering best in-class point solutions with automated work flow and processes. Cyber Security Center of Excellence (CoE) at Cloud4C helps its customers to handle the end to end cycle of an incident or threat Objectives • Experience Azure Sentinel • Discover and analyze threats • Understand how to mitigate threats • Plan next steps Engagement Roadmap: This 4 step engagement will help you in developing a deployment roadmap for implementing Sentinel in security operations. It cover customers’ journey from onboarding to Azure Sentinel with scoping and technical set up, remote monitoring, threat exploration and report generation to final results presentation.
• Week1: Pre Engagement Call to give an engagement overview, define scope and identify the right stakeholders • Week 1: Technical Engagement to setup trial license with Deploy and Configure Azure Sentinel • Week1-4: Threat Exploration and Report Generation is done with Remote incident monitoring during the data collection phase and an optional action of threat hunting to discover Indicators of attack in the ingested data • Week 4: Results Presentation to gain visibility into threats in your cloud and on-premises environment and get recommendations from on how to mitigate or avoid cyber-attacks