AC3's Microsoft Sentinel Best Practice Review - 4-week Review & Workshops

AC3

An experienced Cyber Security expert will document & review your Microsoft Sentinel environment to provide a best practice assessment with recommendations and roadmaps to optimise your investment.

Description:

Whether your organisation is still assessing or have already deployed Microsoft Sentinel, AC3 reveal if you are getting the most out of your Microsoft Sentinel investment by qualifying your Sentinel deployment against Microsoft’s Best Practices and configured to support your business needs and operational objectives.

Working with AC3, a Microsoft Gold Partner, we can take a deep look at the current state of your Microsoft Sentinel environment.,. When you choose to do a Best Practice Assessment with us, you’ll have access to unprecedented industry knowledge and expertise, plus a comprehensive breadth of services, tools, and technologies to help maximise your Microsoft Sentinel investment.

Our Best Practice Assessment will provide you with:

    • Confirmation whether the solution is meeting your business and compliance requirements
    • Confirmation whether relevant events are being collected to support your detection strategy
    • Cost reviews
    • A basic threat hunt and recommendations on how to align with adversarial tactics and techniques and common knowledge
    • Review and recommendations about high value workbooks and incident management

Included in our Best Practice Assessment is:

A Project: AC3 will execute a standardised Project in accordance with AC3’s Project Management methods, including the effort for appropriately skilled and experienced Project Managers and Cyber Security experts.

Project Duration: Approximately 4-weeks for project completion, with some customer dependencies.

Project Activities include:  

  • Current Documentation Review 
  • Point-in-time assessments in line with Microsoft best practice
    • Microsoft Sentinel Workspace Architecture
      • Log Analytics Workspace Architecture
      • Log Collection Strategy
      • Costs & Billing
      • Access Control
      • Third Party Integrations
    • Security Operations Assessment
      • Detection Engineering
      • High Level Threat Hunt
      • Workbooks
      • Incident Management
    • A written report covering all assessed areas, with improvement recommendations.

Project Deliverables:

  • Baselined Project Schedule
  • Project Status Reporting
  • Written Report & Presentation

 

 

https://store-images.s-microsoft.com/image/apps.1158.f315922e-3625-4514-93fa-f322d297d8a2.8add5712-1e5d-4f6d-b6e4-8dbb50bdc406.a95e086f-e9ae-47c7-9cd2-90e8006e8edd
https://store-images.s-microsoft.com/image/apps.1158.f315922e-3625-4514-93fa-f322d297d8a2.8add5712-1e5d-4f6d-b6e4-8dbb50bdc406.a95e086f-e9ae-47c7-9cd2-90e8006e8edd
https://store-images.s-microsoft.com/image/apps.64288.f315922e-3625-4514-93fa-f322d297d8a2.21267d22-67ba-4028-8486-366968487846.87efc71e-cc93-45f9-bb40-e140857b152d
https://store-images.s-microsoft.com/image/apps.23461.f315922e-3625-4514-93fa-f322d297d8a2.8add5712-1e5d-4f6d-b6e4-8dbb50bdc406.ca1f4250-d3d4-46b4-9e8c-86e59a9844f8