<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SolCyber Customer Experience on SolCyber Knowledgebase</title><link>https://kb.solcyber.com/solcyber-customer-experience/</link><description>Recent content in SolCyber Customer Experience on SolCyber Knowledgebase</description><generator>Hugo</generator><language>en</language><atom:link href="https://kb.solcyber.com/solcyber-customer-experience/index.xml" rel="self" type="application/rss+xml"/><item><title>SolCyber Service Features</title><link>https://kb.solcyber.com/solcyber-customer-experience/solcyber-service-features/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/solcyber-service-features/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_ServiceFeatures.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;h2 id="advanced-email-protectionx20"&gt;Advanced Email Protection &lt;a class="anchor" href="#advanced-email-protectionx20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Proactive blocking of malicious emails including SPAM, Phishing and BEC &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Assist in integration with mail platform &lt;/li&gt;
&lt;li&gt;Migration and maintenance of white list and black lists &lt;/li&gt;
&lt;li&gt;Monitoring of high risk users against BEC &lt;/li&gt;
&lt;li&gt;SOC triage on quarantine release to reduce risk &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="endpoint-detection-and-responsex20"&gt;Endpoint Detection and Response &lt;a class="anchor" href="#endpoint-detection-and-responsex20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Prevention, detection and response capabilities at the endpoint. &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Remote assist in roll out of agent and associated troubleshooting&lt;/li&gt;
&lt;li&gt;Management of security policies including enabling blocking mode &lt;/li&gt;
&lt;li&gt;Detection, mitigation and quarantining of malware and behavioral detections.&lt;/li&gt;
&lt;li&gt;Collect detailed telemetry used in alert triage and incident investigations:
&lt;ul&gt;
&lt;li&gt;ex. network connections, registry modifications, file creation and modification, DNS requests, processes, etc&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Ability to network quarantine devices, when necessary&lt;/li&gt;
&lt;li&gt;Remote command line access for containment and additional triage&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="phishing-simulation-and-trainingx20"&gt;Phishing Simulation and Training &lt;a class="anchor" href="#phishing-simulation-and-trainingx20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Harden your weakest link, your employees. Service is designed to be practical so users actually learn and don’t treat it as another compliance exercise. &lt;/p&gt;</description></item><item><title>Roles and Responsibilities</title><link>https://kb.solcyber.com/solcyber-customer-experience/roles-and-responsibilities/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/roles-and-responsibilities/</guid><description>&lt;h2 id="where-solcyber-helpsx20"&gt;Where SolCyber Helps &lt;a class="anchor" href="#where-solcyber-helpsx20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Detect and respond to threats against the traditional IT infrastructure &lt;/li&gt;
&lt;li&gt;Visibility into security posture and continuous advice on how to improve your overtime &lt;/li&gt;
&lt;li&gt;Ensure all the bundled tools are working optimally and constantly adjusted based off threats &lt;/li&gt;
&lt;li&gt;Evaluate the performance of all tools regularly and update as needed based off changes in technology and threats &lt;/li&gt;
&lt;li&gt;Answer questions and provide advice around security best practices &lt;/li&gt;
&lt;li&gt;Support compliance efforts with included controls and communicate to auditors where needed &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="where-to-focus-your-resourcesx20"&gt;Where to Focus Your Resources &lt;a class="anchor" href="#where-to-focus-your-resourcesx20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Own security strategy and augment SolCyber’s capabilities &lt;/li&gt;
&lt;li&gt;Coordinate response with our analysts when needed &lt;/li&gt;
&lt;li&gt;Security architecture such as zero trust implementation &lt;/li&gt;
&lt;li&gt;Personalized security: &lt;/li&gt;
&lt;li&gt;Application security / Devsecops &lt;/li&gt;
&lt;li&gt;Anti fraud &lt;/li&gt;
&lt;li&gt;Supply chain risk &lt;/li&gt;
&lt;li&gt;Insider risk &lt;/li&gt;
&lt;li&gt;Compliance and other regulations &lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Onboarding Guide</title><link>https://kb.solcyber.com/solcyber-customer-experience/master/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/master/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_OnboardingGuide.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;h2 id="intro"&gt;Intro&lt;a class="anchor" href="#intro"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;This document serves as a high-level guide to help customers understand the SolCyber onboarding process.&lt;/p&gt;
&lt;h2 id="objectives"&gt;Objectives&lt;a class="anchor" href="#objectives"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Transition security operations to SolCyber​.&lt;/li&gt;
&lt;li&gt;Get to know your team​.&lt;/li&gt;
&lt;li&gt;Establish roles and responsibilities​.&lt;/li&gt;
&lt;li&gt;Understand the process and timelines.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="key-stakeholders"&gt;Key Stakeholders&lt;a class="anchor" href="#key-stakeholders"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Role&lt;/th&gt;
 &lt;th&gt;Customer/SolCyber&lt;/th&gt;
 &lt;th&gt;Main Responsibility&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Customer Success​&lt;/td&gt;
 &lt;td&gt;SolCyber​&lt;/td&gt;
 &lt;td&gt;Ensure success of onboarding and point of contact for all non-security related queries​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Lead Analyst&lt;/td&gt;
 &lt;td&gt;SolCyber&lt;/td&gt;
 &lt;td&gt;Primary security contact​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Project Lead&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Lead contact for on-boarding to help coordinate between the different parties​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Security Lead&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Lead contact to work with the SolCyber SOC​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Email Admin&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Assist with deployment of Advanced Email Protection​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;IT Desktop Admin&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Assist with deployment of Endpoint Persistence Agent​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Network Admin&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Assist with deployment of Lateral Movement Detection node​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="key-milestones-and-timeline"&gt;Key Milestones and Timeline&lt;a class="anchor" href="#key-milestones-and-timeline"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2888%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>Supported Products and Platforms</title><link>https://kb.solcyber.com/solcyber-customer-experience/supported-product-list/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/supported-product-list/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_ProductsPlatforms.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;In general, the SolCyber foundational technology stack supports the following:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Operating Systems&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows 10/11&lt;/li&gt;
&lt;li&gt;Windows Server 2012/2016/2019&lt;/li&gt;
&lt;li&gt;MacOS Catalina/Big Sur/Monterey&lt;/li&gt;
&lt;li&gt;Linux (most distros)&lt;/li&gt;
&lt;li&gt;Limited Support for Windows 7/8&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Email Platforms&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Microsoft Exchange/Office 365&lt;/li&gt;
&lt;li&gt;Google Workspace&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="data-ingestion"&gt;Data Ingestion&lt;a class="anchor" href="#data-ingestion"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;SolCyber SOC Platform supports the ingestion of telemetry data from the following platforms. Please work with your Customer Success representative to onboard additional sources or contact sales to purchase additional EPS buckets.&lt;/p&gt;</description></item><item><title>Recommended Logs</title><link>https://kb.solcyber.com/solcyber-customer-experience/recommended-logs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/recommended-logs/</guid><description>&lt;p&gt;Securonix is a powerful platform that enables our analysts to detect and triage incidents. It can collect data from a host of technologies to enable our SOC to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Provide additional context for a primary indicator &lt;/li&gt;
&lt;li&gt;Enable unique detection of threats &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We’re solely focused on providing better security so we recommend only sending us logs that provide &lt;strong&gt;high security value&lt;/strong&gt;. If you have logs that you want to setup specific alerts for, that works as well. Here’s what we recommend sending over and why. &lt;/p&gt;</description></item></channel></rss>