Log Management & SIEM – Splunk and Sentinel

Log Management & SIEM – Splunk and Sentinel

Situational picture is one of the biggest “hype words” at the moment. Most simply, situational picture is an overview into your cyber security posture, generated from several log sources.  At its best, a situational picture includes application logs, data communication logs, customer feedback systems, ticketing systems, as well as public news sources, threat intel and possibly much more. Building all this is challenging; mapping and defining needs, and deciding what’s “good enough” is a cumbersome process.

What Mint Security delivers

We provide services in the following areas:

  • Log management requirements analysis and planning
  • Customer-focused SOC tenders and outsourcing
  • SOC-driven SOC technology tenders
  • Establishing in-house SOCs
  • Splunk technology implementations and deployments
  • Sentinel deployments
  • Splunk and Sentinel integrations
  • Creating a comprehensive security situational overview

We assist in identifying initial needs and can handle installations even in complex and challenging environments. We design log management architecture from the perspectives of performance, redundancy, log security, and overall cybersecurity. Controlling access to logs is a critical aspect of security.

Our expertise in audit logs is built on experience with highly demanding financial sector environments, and our skills scale accordingly.

We are technology-agnostic, but we excel in Splunk and Sentinel environments when it comes to technical implementations. However, in competitive bidding, we remain open-minded about different technologies.

Customer Needs and Challenges to Be Solved

Every customer environment is unique, and each client has specific needs. However, the challenges we address can generally be categorized as follows:

  • Endpoint visibility
  • Monitoring and alerting
  • Compliance management
  • Security device visibility
  • Infrastructure visibility
  • SecDevOps environment monitoring
  • Runtime logging for system software
  • Compliance and audit logging
  • Application development environment and software security assessment

Sentinel

Sentinel plays a crucial role in a well-managed Microsoft 365 environment. It provides a streamlined way to monitor and track activity across Entra, Defender, Purview, Intune, and the entire Azure infrastructure. However, careful planning and budgeting are essential before implementation.

Once deployed, it’s equally important to establish clear processes for who is responsible for what and when.

With thorough preparation, an organization retains control over its most valuable asset—security monitoring—while having the option to outsource the more routine tasks, such as overnight monitoring, if needed.

Splunk

We have extensive expertise in Splunk and prefer it for complex log management solutions. With Splunk, we can deliver excellent results while providing comprehensive support to our customers—covering everything from planning and implementation to system operations, content creation, and the development of alerts and SOC integrations.

Already using Splunk!

We are looking to implement Splunk

There is a lot to write about Splunk and the endless opportunities therein – so we have decided to share both expertise as well as opinions as separate blogs.

Splunk and Auditd
Thomas

Splunk & Auditd with Defender ATP and Vulnerability Scanning

This blog post offers a few simple tricks and tips that will ensure that your security controls do not interfere with each other. The tricks are not really tricks, just plain old configurations which offers food for thought. As we know, Splunk is the most complex beast of a software out there.

Read more »

More details about our methods and tools

We are hard-core Splunk experts. We have successfully brought our experience from over the years to Sentinel. Our expertise is not product-specific, but relying on our experience, we can conjure up views in big log data in any environment.

Below are some screenshots of actual (and anonymized) log analysis.

Map of Europe

We do Splunk implementations worldwide. We prefer to do preparations offsite, initial planning as a workshop onsite, then installations and configurations over remote connections and finalization, training and handover again onsite. We have a clear concept, the final implementation is always up to the customer.

Splunk header

Splunk is one of the most popular and largest log management vendors today. Spunk is widely used, there are lots of extensions and addons even for the most exotic use cases. Splunk can go beyond huge amounts of data and does not limit the source types or log formats in any way. Whatever you throw at it, we will work it out without expensive and time consuming efforts.

Licensing

As part of our commitment to delivering an end to end solution, we also provide licenses for Splunk.

contact us

Please do contact us. We most likely respond faster than you thought,