{"id":4270,"date":"2023-08-15T05:24:37","date_gmt":"2023-08-15T12:24:37","guid":{"rendered":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/"},"modified":"2023-08-15T05:24:37","modified_gmt":"2023-08-15T12:24:37","slug":"securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel","status":"publish","type":"post","link":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","title":{"rendered":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel"},"content":{"rendered":"\n<p><a href=\"https:\/\/stuf.in\/bc1ugw\"><img decoding=\"async\" style=\"max-width: 600px\" src=\"https:\/\/i.ytimg.com\/vi\/dtyDMjMvN98\/maxresdefault.jpg\" alt=\"\" \/><\/a><\/p>\n<p>    Sometimes you outgrow the capabilities of a well-loved tool\u2014that&#8217;s exactly what happened to Microsoft and its on-premises Security Information Event Management (SIEM) system. Thanks to a timely assist from Microsoft Azure Sentinel, the company hasn&#8217;t missed a beat. Watch the video to gain insight on the benefits of running Microsoft&#8217;s SIEM on Microsoft Azure.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bc1ugw\" target=\"_blank\" rel=\"noopener\">View&#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Accelerate and empower your security engineers. Watch the @Microsoft video to discover lessons learned from the migration of their legacy Security Information Event Management (SIEM) system to Microsoft Azure Sentinel. When you&#8217;re done watching, tell us if you&#8217;d like to discuss the benefits of Azure Sentinel solutions with one of our Microsoft experts. #Microsoft #Azure<\/p>\n","protected":false},"author":1,"featured_media":4269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - ETG Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - ETG Consulting\" \/>\n<meta property=\"og:description\" content=\"Accelerate and empower your security engineers. Watch the @Microsoft video to discover lessons learned from the migration of their legacy Security Information Event Management (SIEM) system to Microsoft Azure Sentinel. When you&#039;re done watching, tell us if you&#039;d like to discuss the benefits of Azure Sentinel solutions with one of our Microsoft experts. #Microsoft #Azure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\" \/>\n<meta property=\"og:site_name\" content=\"ETG Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-15T12:24:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/etg-it.ca\/wp-content\/uploads\/2023\/08\/maxresdefault.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/etg-it.ca\/#\/schema\/person\/a9e5d0ffe224f1dbb689231cfb8f4df5\"},\"headline\":\"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel\",\"datePublished\":\"2023-08-15T12:24:37+00:00\",\"dateModified\":\"2023-08-15T12:24:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\"},\"wordCount\":68,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/etg-it.ca\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\",\"url\":\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\",\"name\":\"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - ETG Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/etg-it.ca\/#website\"},\"datePublished\":\"2023-08-15T12:24:37+00:00\",\"dateModified\":\"2023-08-15T12:24:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/etg-it.ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/etg-it.ca\/#website\",\"url\":\"https:\/\/etg-it.ca\/\",\"name\":\"ETG Consulting\",\"description\":\"Microsoft Dynamics 365\",\"publisher\":{\"@id\":\"https:\/\/etg-it.ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/etg-it.ca\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/etg-it.ca\/#organization\",\"name\":\"ETG Consulting\",\"url\":\"https:\/\/etg-it.ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/etg-it.ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/etg-it.ca\/wp-content\/uploads\/2018\/09\/etg-consulting-logos-e1536441993524.jpg\",\"contentUrl\":\"https:\/\/etg-it.ca\/wp-content\/uploads\/2018\/09\/etg-consulting-logos-e1536441993524.jpg\",\"width\":250,\"height\":116,\"caption\":\"ETG Consulting\"},\"image\":{\"@id\":\"https:\/\/etg-it.ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/etg-consulting\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/etg-it.ca\/#\/schema\/person\/a9e5d0ffe224f1dbb689231cfb8f4df5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/etg-it.ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d8982c516c8e0f2febac5a1b2ee03859?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d8982c516c8e0f2febac5a1b2ee03859?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - ETG Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","og_locale":"en_US","og_type":"article","og_title":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - ETG Consulting","og_description":"Accelerate and empower your security engineers. Watch the @Microsoft video to discover lessons learned from the migration of their legacy Security Information Event Management (SIEM) system to Microsoft Azure Sentinel. When you're done watching, tell us if you'd like to discuss the benefits of Azure Sentinel solutions with one of our Microsoft experts. #Microsoft #Azure","og_url":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","og_site_name":"ETG Consulting","article_published_time":"2023-08-15T12:24:37+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/etg-it.ca\/wp-content\/uploads\/2023\/08\/maxresdefault.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#article","isPartOf":{"@id":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/"},"author":{"name":"admin","@id":"https:\/\/etg-it.ca\/#\/schema\/person\/a9e5d0ffe224f1dbb689231cfb8f4df5"},"headline":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel","datePublished":"2023-08-15T12:24:37+00:00","dateModified":"2023-08-15T12:24:37+00:00","mainEntityOfPage":{"@id":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/"},"wordCount":68,"commentCount":0,"publisher":{"@id":"https:\/\/etg-it.ca\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","url":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/","name":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel - ETG Consulting","isPartOf":{"@id":"https:\/\/etg-it.ca\/#website"},"datePublished":"2023-08-15T12:24:37+00:00","dateModified":"2023-08-15T12:24:37+00:00","breadcrumb":{"@id":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/etg-it.ca\/2023\/08\/15\/securing-the-enterprise-and-responding-to-cybersecurity-attacks-with-microsoft-azure-sentinel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/etg-it.ca\/"},{"@type":"ListItem","position":2,"name":"Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel"}]},{"@type":"WebSite","@id":"https:\/\/etg-it.ca\/#website","url":"https:\/\/etg-it.ca\/","name":"ETG Consulting","description":"Microsoft Dynamics 365","publisher":{"@id":"https:\/\/etg-it.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/etg-it.ca\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/etg-it.ca\/#organization","name":"ETG Consulting","url":"https:\/\/etg-it.ca\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/etg-it.ca\/#\/schema\/logo\/image\/","url":"https:\/\/etg-it.ca\/wp-content\/uploads\/2018\/09\/etg-consulting-logos-e1536441993524.jpg","contentUrl":"https:\/\/etg-it.ca\/wp-content\/uploads\/2018\/09\/etg-consulting-logos-e1536441993524.jpg","width":250,"height":116,"caption":"ETG Consulting"},"image":{"@id":"https:\/\/etg-it.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/etg-consulting\/"]},{"@type":"Person","@id":"https:\/\/etg-it.ca\/#\/schema\/person\/a9e5d0ffe224f1dbb689231cfb8f4df5","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/etg-it.ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d8982c516c8e0f2febac5a1b2ee03859?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d8982c516c8e0f2febac5a1b2ee03859?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/posts\/4270"}],"collection":[{"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/comments?post=4270"}],"version-history":[{"count":0,"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/posts\/4270\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/media\/4269"}],"wp:attachment":[{"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/media?parent=4270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/categories?post=4270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/etg-it.ca\/wp-json\/wp\/v2\/tags?post=4270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}