{"id":6446,"date":"2022-09-12T17:14:59","date_gmt":"2022-09-12T17:14:59","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=6446"},"modified":"2022-09-12T17:14:59","modified_gmt":"2022-09-12T17:14:59","slug":"securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","title":{"rendered":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/dtyDMjMvN98\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    Sometimes you outgrow the capabilities of a well-loved tool\u2014that&#8217;s exactly what happened to Microsoft and its on-premises Security Information Event Management (SIEM) system. Thanks to a timely assist from Microsoft Azure Sentinel, the company hasn&#8217;t missed a beat. Watch the video to gain insight on the benefits of running Microsoft&#8217;s SIEM on Microsoft Azure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Accelerate and empower your security engineers. Watch the @Microsoft video to discover lessons learned from the migration of their legacy Security Information Event Management (SIEM) system to Microsoft Azure Sentinel. When you&#8217;re done watching, tell us if you&#8217;d like to discuss the benefits of Azure Sentinel solutions with one of our Microsoft experts.  <\/p>\n<p>#Microsoft #Azure<\/p>\n","protected":false},"author":2,"featured_media":6445,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1139,1136],"tags":[],"class_list":["post-6446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Accelerate and empower your security engineers. Watch the @Microsoft video to discover lessons learned from the migration of their legacy Security Information Event Management (SIEM) system to Microsoft Azure Sentinel. When you&#039;re done watching, tell us if you&#039;d like to discuss the benefits of Azure Sentinel solutions with one of our Microsoft experts.  #Microsoft #Azure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-12T17:14:59+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel\",\"datePublished\":\"2022-09-12T17:14:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\"},\"wordCount\":70,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/maxresdefault-3.jpg\",\"articleSection\":[\"Microsoft\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\",\"name\":\"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/maxresdefault-3.jpg\",\"datePublished\":\"2022-09-12T17:14:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/maxresdefault-3.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/maxresdefault-3.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","og_locale":"en_US","og_type":"article","og_title":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - TechTonic Times","og_description":"Accelerate and empower your security engineers. Watch the @Microsoft video to discover lessons learned from the migration of their legacy Security Information Event Management (SIEM) system to Microsoft Azure Sentinel. When you're done watching, tell us if you'd like to discuss the benefits of Azure Sentinel solutions with one of our Microsoft experts.  #Microsoft #Azure","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","og_site_name":"TechTonic Times","article_published_time":"2022-09-12T17:14:59+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel","datePublished":"2022-09-12T17:14:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/"},"wordCount":70,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/maxresdefault-3.jpg","articleSection":["Microsoft","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","name":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/maxresdefault-3.jpg","datePublished":"2022-09-12T17:14:59+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/maxresdefault-3.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/maxresdefault-3.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=6446"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6446\/revisions"}],"predecessor-version":[{"id":6447,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6446\/revisions\/6447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/6445"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=6446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=6446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=6446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}