Microsoft Azure Sentinel

Developed by Mimecast

From Detection to Security Insights

Now updated to utilise Microsoft Sentinel data collectors!

By integrating Mimecast with Microsoft Seninel, organizations gain search and correlation capabilities across all log types to detect and respond to cyberattacks. Deep security insights and rich data visualizations cut cyberattack detection times and empowers incident response and threat-hunting teams to uncover the full kill chain to proactively find potentially malicious activity.

Solution Overview

1. Emails received by Mimecast are passed through a series of hygiene scanning techniques, to ensure that they are safe before delivery to the recipient.

2. Email intelligence provided by Mimecast is sent to Microsoft Sentinel for normalization.

3. Microsoft Sentinel uses the email intelligence to alert analysts and add context to data from other data sources.

 

Mimecast + Microsoft Sentinel Use Cases:

Mimecast data ingested adds additional data and context within Microsoft Sentinel to aid: 

Threat Correlation

Identify initial attack deployment methodology, characteristics and subsequent access attempts without the need for manual effort or multiple toolsets.

Advanced Threat Detection

Improve your organization's security posture and detect threats by augmenting email perimeter defense with user and entity behavior analytics. 

Lateral Movement Detection

Detect and follow attackers even as they switch IP addresses, devices or credentials.

Alert Prioritization

Increase efficiency and effectiveness by prioritizing the most pressing threats. 

Threat Intelligence

Understand how your organization has been targeted and what attacks have been blocked for better protection at the email perimeter, inside the network and beyond its perimeter.

Threat Investigation

Analyze activity events before and after an attack across the entire attack chain to enhance analyst productivity and remediate vulnerabilities.

                                              Key Benefits

 

01.

Earlier detection and containment of attacks, with rapid response to phishing and business email compromise tactics.

02.

Threat intelligence enrichment detects threats within Mimecast events.

03.

Improve analysis and knowledge of threats through built in dashboards and Mimecast regional threat intelligence.

04.

Correlation across Mimecast events, cloud, endpoint, and network data to quickly identify high-risk individuals and devices that may create future security breaches.

05.

Shared intelligence identifies the original threat and targets.

Back to Top