https://store-images.s-microsoft.com/image/apps.25495.93f5315f-009f-44d9-84c9-6b2af27d2d3d.23ff8f0f-b8f0-4355-9ab4-abd6e798265d.72307983-bf4a-48b3-97f0-35e9e3ba2a27

ThreatHunter MXDR: 3-Wk Implemenation

eGroup Enabling Technologies

eGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.

CISO’s face constant challenges. Supply chain attacks are trending. Ransomware demands are spiking. Threats evolve faster than existing tools can detect, and skilled resources are in demand. This often leaves alerts unaddressed, and SecOps teams reacting rather than building better defenses.

Microsoft’s Magic Quadrant-leading security tools aren’t optimized by default. Each organization must make specific configurations to protect valuable targets, automate alerts, and proactively remediate.

eGroup Enabling Technologies, LLC provides ThreatHunter: consulting, configuration, and training services to help organizations protect, detect, and respond to risks. This engagement does not require the clients resources and time for the whole project as some of the three weeks are running the applications to determine threats and need no client involvement.

Week 1 - Reduce Ransomware Risk
- Configure Microsoft 365 Defender for Identity and sensors on two AD Domain Controllers on-premises
- Configure the Microsoft 365 Defender for Endpoint portal and onboard up to 10 machines
- Design up to two Endpoint Protection (Surface Area Reduction) policies and on up to 10 machines
- Enable Microsoft 365 Defender Device Groups and Role-Based Access Controls for Automation

Week 2 - Modernize SecOps
- Configure Microsoft 365 Cloud App Security and Azure AD to alert or block compromised accounts
- Configure SafeLinks and SafeAttachments to latest best practices
- Configure Azure Sentinel

1. Proactively reduce risk of catastrophic events
2. Constantly monitor for nefarious behavior on critical systems
3. Receive actionable insights about incidents before they spread
4. Empower staff to efficiently detect and respond to incidents
5. Automate whenever possible

Week 3 - Training

At a glance

https://store-images.s-microsoft.com/image/apps.14872.93f5315f-009f-44d9-84c9-6b2af27d2d3d.23ff8f0f-b8f0-4355-9ab4-abd6e798265d.d97e99ab-cb55-47a0-a5b6-fd697a4bb2af
https://store-images.s-microsoft.com/image/apps.10226.93f5315f-009f-44d9-84c9-6b2af27d2d3d.b798c529-334c-4fff-9673-c52413c26ecf.d3944cfa-8ed2-442d-804d-3729b9ac941f