As organizations continue to move business operations to the cloud, security teams are considering native security tools within Microsoft’s suite, such as Microsoft Sentinel, Microsoft 365 Defender and Defender for Cloud. However, Microsoft’s cost structure can be complex, and organizations often struggle to get the most from their investments, running into pitfalls that can be easily overlooked during the buying cycle and even after implementation.
Watch Kroll Cyber Risk experts Scott Hanson, Thomas Hind and Rafael De Lima share key steps you can take to leverage Microsoft E3/E5 security solutions more effectively and securely.
This webinar covers:
- The security technologies to prioritize from your E5/Microsoft Defender license
- Tuning Microsoft-specific detections and playbooks in line with your threat landscape
- The most effective ways to integrate Microsoft Defender products and Microsoft Sentinel
- Key steps to incorporate threat intelligence and DFIR principles into your response actions
You can also download the slide deck here.