This service implements a small functionality of Microsoft Sentinel and focuses on controlling the work with certain files or folders for SharePoint Online, OneDrive, and Microsoft Teams.

    Description #

    Microsoft Sentinel is a cloud-native SIEM solution powered by AI and automation that helps you collect and analyze data in a security context from a variety of sources. With Microsoft Sentinel, you can detect various attacks and threats that occur in your services in real-time, quickly investigate them and if necessary, activate automation scripts.

    Often, having a restricted site with sensitive corporate information that only certain people can access, does not prevent your IT admins, IT managers, and other users with elevated privileges from accessing the corporate confidential data without your knowledge and this can become a significant issue for your organization. Microsoft Sentinel lets you quickly discover such unwanted changes and notify all interested parties with minimal cost and maximum preservation of your work principles. Though it will not be able to prevent unauthorized access, you can also consider other services - such as Azure Information Protection or Data Loss Prevention Policy. However, they are more complex to implement and require the participation of end users.

    Our goal is to connect your data sources (such as SharePoint for example) and set up all the necessary rules and notifications to keep you informed if anyone downloads/opens a certain file or makes changes in permissions. For example, if a system administrator adds himself as a site member to gain access to sensitive data, you will receive an email or a message in Teams. An incident will also be created in Microsoft Sentinel where you can find all the additional information and perform in-depth analysis if required.

    IT Partner responsibilities #

    1. Gather all the required information to implement the solution.
    2. Set up Microsoft Sentinel and configure the required connectors.
    3. Enable custom analytics rules to catch the required events.
    4. Configure automation rules and Azure Logic apps for notification purposes.
    5. Performs tests.

    Client responsibilities #

    1. Provide access to tenant and Azure subscription.
    2. Provide the information required for rule configuration.

    Plan #

    The plan may vary depending on your needs.

    1. Kickoff meeting.
    2. Gather the required information.
    3. Plan and approve rules.
    4. Provision the appropriate subscriptions.
    5. Implement the solution.
    6. Perform testing and demonstration.

    Success criteria #

    1. The client has an Azure Subscription with a Microsoft Sentinel instance.
    2. Microsoft Sentinel is configured according to the clients' requirements.
    3. The desired scenarios and tasks have been successfully tested and confirmed.

    Related services

    Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations

    Service built to help you protect your Microsoft 365 environment using security capabilities, such as anti-phishing, anti-spam, and anti-malware protection

    Azure Files Implementation

    This service allows you to quickly start taking advantage of cloud technologies when working with various files. With Azure Files, you can connect to data stored in the cloud in the same way as you would with a network share on your local network.

    Price:
    $1,500