WEBINAR
Logging with precision, optimising your costs

Reducing ingestion charges shouldn’t mean compromising on security. Discover how to optimise log data without losing vital context and start saving immediately. 

Choosing the Right MSSP for Microsoft Sentinel and Modern SOC Operations

Despite the many benefits of working with MDR service provider, security and business leaders often wrestle with the potential for having to ‘fit in’ to the provider’s way of working. Each business has its own strategy and security operations align with the overall business objectives, without intimate knowledge of a given business culture, how can an MDR service provider be sure they are making the proper judgement calls in response to a critical alert?  

 

Questions to Ask Potential MSSPs During Research 

Selecting the right MSSP is critical for success. When evaluating providers, consider asking the following: 

  • How do you tailor threat detection to my business needs? 
  • What level of transparency and control will my team have? 
  • How does your Target Operating Model align with my business operations? 
  • What is your approach to minimising false positives and reducing alert fatigue? 
  • Can you provide references from similar-sized organisations in my industry? 
  • Do you have expertise in optimising and managing Microsoft Sentinel for long-term effectiveness?

Response Times and Escalation Processes: Why They Matter 

A critical factor in evaluating an MSSP or hybrid SOC provider is their approach to response times and escalation processes. Traditional metrics such as Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) have long been used to gauge SOC performance. However, the more crucial metric in today’s landscape is Mean Time to Contain (MTTC). 

Understanding Key SOC Metrics 

  • MTTD (Mean Time to Detect): The average time taken to identify and classify a potential threat. 
  • MTTR (Mean Time to Respond): The time from detection to resolution. 
  • MTTC (Mean Time to Contain): The time it takes to disrupt an attack and prevent further proliferation. 

While MTTD and MTTR remain important, a modern SOC must focus on reducing MTTC by proactively disrupting attacks before they escalate. This requires visibility across the attack surface, rapid decision-making, and automated containment mechanisms. 

 

Proactive Attack Disruption with Sentinel 

A successful MSSP or hybrid SOC should enable attack containment through: 

  • Real-time Threat Intelligence Integration: Ensuring Sentinel queries align with the latest threat techniques. 
  • Automated Response Playbooks: Using Sentinel’s automation tools to enable instant containment of threats without waiting for manual intervention. 
  • Continuous Threat Hunting: Leveraging KQL-based threat hunting within Sentinel to proactively identify and neutralise threats. 
  • Attack Surface Management: Extending Sentinel’s detection capabilities beyond endpoints to cloud workloads, identity systems, and network layers. 

Related Posts

e2e-assure, a leading provider of Managed Threat Detection and Response (MTDR) services, is thrilled to announce its shortlisting for the Best Customer Service award at

As cyber threats grow in complexity and frequency, organisations are ingesting more data than ever to fuel their Threat Detection & Response (TDR) capabilities. While