Unpopular opinion: The more I dive into Azure Sentinel, the less I'm impressed. For SMBs it's OK for commodity alarms due to the simplicity of O365 logs and others, but customized alarms, threat hunting, etc. is very difficult.
I do like KQL, but it's not even close to others.
Using Sentinel as a method for increasing coverage and effectiveness of TTPs would be difficult for an organization other than commodity attacks.
I do want to state that Microsoft is by far stepping up the game all around and very noticeably.
This isn't a gripe about anyone at all. Some amazing folks there working hard.
I'm just providing my experiences with Sentinel, and just not impressed.
What I will say is having any type of visibility into cloud infrastructure is better than most norms which is none. Having Azure or AWS logging in a predominant cloud org is a good thing.
Most SIEMs though have moved towards that model and have a much better way to query data.
Not just query data, but build alarms and better detections based on their own environment. That's key... Continual progression of coverage and effectiveness of attack paths within an organization is a recipe for success.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Last week, made a comment about how I wasn't a huge fan of Sentinel overall. Got to dive a bit deeper into it with my team over at Binary and has definitely changed my perspective a bit.
Sentinel is not easy by any stretch but there is a lot to it.
If you have the right data going into it (which isn't easy), and you have a team behind you to build up the detections, Sentinel is extremely powerful.
With jupyter and KQL foundation is super powerful to build what you need to off of it.
From my comments earlier, it is a solid product.. It just requires a substantial lift to get it to a point that will help you mature monitoring and detection capabilities.
Requires a knowledgeable team is the biggest thing there.
Client: Why didn't nextgen EDR pick any of this up?
Us: Detection is more than just an EDR, it requires an understanding of your network.
Client: Can you get on phone with the vendor to share all of your TTPs so they can detect?
We're working with the customer to help educate and shore up the deficiencies, but it's just rough because of the over-reliance on security tools versus baselining and doing the work for your own environment.
This also isn't just a CustomerX problem. It's a widescale industry problem in general. There is no solution out there that does the hard work of building a security program or focusing on your threat models and baselining your own infrastructure.
One thing that I’ve learned from my nutritionist / planner is to screw fad diets (keto as an example) and focus on your body. Start counting calories, and focus on primarily protein intake and balance the rest. Workout days for me 2300 calories, 200g of protein and mix fat/carbs.
If you are going to do long term fitness for life, you need something that you can sustain yourself on.
Non workout days 2100 calories.
For tough working days I stack more carbs, for less workout days, I stack less.
I count every calorie I put in my body religiously.
I was freaking out at first, I gained weight, but that is due to protein taking longer to digest and body to get use to it. Week one gained ten pounds, week two down 8 pounds. Put on a lot of muscle and having larger gains.
Do not judge yourself on weight and adjust slowly.