Last week, made a comment about how I wasn't a huge fan of Sentinel overall. Got to dive a bit deeper into it with my team over at Binary and has definitely changed my perspective a bit.
Sentinel is not easy by any stretch but there is a lot to it.
If you have the right data going into it (which isn't easy), and you have a team behind you to build up the detections, Sentinel is extremely powerful.
With jupyter and KQL foundation is super powerful to build what you need to off of it.
From my comments earlier, it is a solid product.. It just requires a substantial lift to get it to a point that will help you mature monitoring and detection capabilities.
Requires a knowledgeable team is the biggest thing there.
Having a dedicated threat hunting team is a perfect fit for Sentinel overall...
I think that this would need to be a requirement here if you were looking to deploy and get better with detections and visibility in your organization.
The last piece here, Sysmon + Sentinel is amazing. I would love to have that on an IR or hunting engagement and would probably be my number one thing for an organization to focus on if going the Sentinel route.
Unpopular opinion: The more I dive into Azure Sentinel, the less I'm impressed. For SMBs it's OK for commodity alarms due to the simplicity of O365 logs and others, but customized alarms, threat hunting, etc. is very difficult.
I do like KQL, but it's not even close to others.
Using Sentinel as a method for increasing coverage and effectiveness of TTPs would be difficult for an organization other than commodity attacks.
I do want to state that Microsoft is by far stepping up the game all around and very noticeably.
This isn't a gripe about anyone at all. Some amazing folks there working hard.
I'm just providing my experiences with Sentinel, and just not impressed.
Client: Why didn't nextgen EDR pick any of this up?
Us: Detection is more than just an EDR, it requires an understanding of your network.
Client: Can you get on phone with the vendor to share all of your TTPs so they can detect?
We're working with the customer to help educate and shore up the deficiencies, but it's just rough because of the over-reliance on security tools versus baselining and doing the work for your own environment.
This also isn't just a CustomerX problem. It's a widescale industry problem in general. There is no solution out there that does the hard work of building a security program or focusing on your threat models and baselining your own infrastructure.
One thing that I’ve learned from my nutritionist / planner is to screw fad diets (keto as an example) and focus on your body. Start counting calories, and focus on primarily protein intake and balance the rest. Workout days for me 2300 calories, 200g of protein and mix fat/carbs.
If you are going to do long term fitness for life, you need something that you can sustain yourself on.
Non workout days 2100 calories.
For tough working days I stack more carbs, for less workout days, I stack less.
I count every calorie I put in my body religiously.
I was freaking out at first, I gained weight, but that is due to protein taking longer to digest and body to get use to it. Week one gained ten pounds, week two down 8 pounds. Put on a lot of muscle and having larger gains.
Do not judge yourself on weight and adjust slowly.