This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Threat Review

What is a Threat Review?

A Threat Review is a meeting between Samurai Security Operation Center (SOC) Analysts your assigned Cybersecurity Advisor (if applicable) and your designates with the goal of ensuring your organization derives maximum value from the Samurai Managed Detection and Response (MDR) service.

Threat Reviews include:

  • review of any reported security incidents within the time period
  • recommendations to improve detection and response
  • follow-up and tracking to ensure reported threats are handled and mitigated
  • dialogue around detection and emerging threats

How often are Threat Reviews conducted?

Threat Reviews are conducted quarterly with a standard Samurai MDR subscription and are typically scheduled during onboarding.

For clients’ that prefer a dedicated senior-level resource and a monthly candence of Threat Reviews the Samurai Cybersecurity Advisor is available as an add-on subscription.

Where can I find more information?

Review MDR Threat Reviews and/or SamurAI Cybersecurity Advisor Service Description.

Threat Reviews and the SamurAI MDR Portal

Threat Review information is available within the Samurai MDR Portal after being published by the SOC. Publication of a new Threat Review will typically occur 24hrs before the scheduled meeting.

To access Threat Reviews, click on Threat Review from the main menu.

The Threat Review landing page displays all Threat Reviews to date for your Samurai MDR subscription and also documented Action Points.

threat_reviews.png

Figure 1: Example Threat Reviews

Threat Review Fields

Find information related to Threat Review fields:

1. Reference

  • Reference number of the Threat Review

2. Status

  • Each Threat Review has a status:

    • Published - a newly created Threat Review for the given time period
    • Closed - Threat Review is closed after meeting with client designates

3. Title

  • A given title for the Threat Review typically based on the time period.

4. Start Date

  • Start date for all detail within the Threat Review.

5. End date

  • End date for all detail within the Threat Review.

Action Points

Action Points are typically tasks that have been documented during a Threat Review. Actions points are tracked over the subcription period and once actioned updated as Completed.

action_points.png

Figure 2: Example Action Points

What now?

Click on a Threat Review listed within the landing page to view more detail. Review Threat Review Detail for additional information.

1 - Threat Review Detail

Information and detail of a Threat Review are presented within the Samurai MDR portal. In this article we walk through elements of each Threat Review.

Summary

Summary information of the Threat Review including status, start and end date. These dates will align with you Samurai MDR subscription (i.e quarterly or monthly) please review How often are Threat Reviews conducted?

tr_timing.png

Figure 1: Example Summary data

Metrics

For the given Threat Review period, various widgets will be displayed providing you insight to the service. This includes:

Monitoring, Detection & Response Summary

The funnel summarizes:

  • telemetry ingested (events) by the Samurai platform from your configured integrations
  • the security detections (alerts) made by the Samurai platform detection engines and third party vendors which are triaged and investigated by the Samurai SOC
  • the number of security incidents reported to your organization

The funnel infers the value of the service based on the data analyzed focusing on detecting and reporting threats to your organization.

security_funnel.png

Figure 2: Example Monitoring, Detection & Response summary for the period

Licence usage

Two charts display your utilized data quota (in Gigabytes GB) against your data subscription (an aggregated quota typically based on number of endpoints subscribed). Any overages or under utilization is discussed with you during the Threat Review meeting.

licence_usage.png

Figure 3: Example Licence usage for the period

Alerts

A donut chart showing the alerts per detection method over the Threat Review period. For a brief explanation of the detection engines please refer to Alerts

tr_alerts.png

Figure 4: Example Alerts per detection method chart

Security Incidents

A chart depicting security incidents reported by severity within the Threat Review period.

tr_security_incidents.png

Figure 4: Example Security incidents per severity chart

Security Incidents

New Security Incidents

Presented in the table are all Security Incidents reported during the Threat Review period.

Click on a Security Incident and you are redirected you to the Situation Room relevant to the Security Incident. Refer to The Situation Room for additional information.

new_security_incidents.png

Figure 5: Example New security incidents table

Highlighted Security Incidents

Any Security Incidents that the SOC determine require attention and discussion during the Threat Review meeting will be included here in table format.

General Tickets

Presented in the table are all general tickets which were created within the Threat Review period.

Click on a General Ticket and you are redirected to the ticket details. Refer to Getting Help for additional information.

New General tickets

new_general_tickets.png

Figure 6: Example New general tickets table

Highlighted general tickets

Any General Tickets that the SOC determine require attention and discussion during the Threat Review will be included here in table format.

Other

Any other topics outside of a standard Threat Review are displayed here, for example a client working with a dedicated Cybersecurity Advisor (CSA) with specific requests may be documented here.

Action Points

A list of current Action Points based on all Threat Review, for example recommendation that have been made which may require your action.

action_points.png

Figure 7: Example Action points table