In previous blog posts, we described how you can deploy SOC Prime TDM Azure Sentinel rules directly to your workspace or even multiple workspaces. This new promo from SOC prime enables you to do that for SOC Prime free content and select premium Azure Sentinel rules and playbooks available for free exclusively to Azure Sentinel users.
About SOC Prime and the Threat Detection Marketplace (TDM)
Improve what you have, not Replace. SOC Prime helps to centrally source and support SIEM content to
maximize the value of existing security investments. SOC Prime Threat Detection Marketplace (TDM) is
the first in the world SIEM agnostic Threat Detection Marketplace. TDM contains SOC ready dashboards, rule packages, and automation playbooks. The content is updated daily to cover emerging threats and allows automated deployment to your SIEM. The thousands of content items are mapped directly to MITRE ATT&CK methodology, allowing you to extend your MITRE ATT&CK coverage.
SOC Prime offers a promotion which enables extended community access to SOC Prime Threat
Detection Marketplace (TDM), which includes, in addition to regular community benefits:
A bonus Office365 security rule pack
A bonus Azure Sentinel starter rule pack
A selection of Azure Sentinel Playbooks
Capability to deploy those and other free rules directly from TDM to an Azure Sentinel instance.
The bonus content, generally available only for paid SOC Prime TDM subscribers, can be used by Azure Sentinel clients and prospects for free as part of the promotion and can be kept free of charge after the PoC.
When using the promo code, your TDM Rule Master, used to customize your TDM environment, is predefined to highlight Azure Sentinel and Microsoft Defender ATP content.
Naturally, you can also use TDM free content in addition to the content available as part of the promotion, open to any TDM community member, in areas such as:
Proactive exploit detection, providing immediate response to newly published exploits.
Detection rules to ensure MITRE ATT&CK coverage.
Cloud security monitoring and Microsoft Active Directory Monitoring, complementing your CASB