To read part 1, please click
hereTo read part 3, please click
hereTo read part 4, please click
hereTo read part 5, please click
here
B2B or GDAP
In order to access tenant level services, tenant level access is required. However, while testing Sentinel, this becomes more important because there are links provided to Microsoft Defender 365 and to make those links to work properly, the user must have access to the services.
GDAP and B2B offers the ability to access tenant level services. Everyone is quite familiar with B2B, which is available for all tenants to invite guests into their tenant to collaborate. But, some partners may have either compliance or cybersecurity insurance requirements preventing them from having an identity in their customers' tenants. Granular Delegated Admin Privileges (GDAP) is exclusively available to Cloud Solution Providers (CSPs) and it is configured by Partner Center. This one can help in accessing customer resources securely and does not require an identity in the customer's tenant.
Partners can choose either GDAP or B2B to access the tenants acting as customer tenant during the POC. For the purpose of Sentinel POC, the access and the behavior of using GDAP vs B2B is equivalent. However, if it is required to follow the same procedures during POC expected to be followed during go-live, then, it is recommended to configure GDAP. But, for simply testing the Sentinel's features for a period of time, then B2B can be used.
More on CSPs
Cloud Solution Providers (CSPs) partners can create subscriptions for customers which is great for the customers not having security subscription and migrating from legacy SIEM solutions. Although this may not be used in POC, but can be tested according to the requirements of POC. That subscription will then be billed through the partner, but will remain associated with the customer's tenant.
Where is data?
The customer's security subscription, where Sentinel is onboarded, should always be associated with the customer's tenant. Sentinel artifacts like, analytics rules, workbooks, automation rules, playbooks, etc., can easily exist either on MSSP workspace or the customer workspace. It should also be noted that features such as UEBA, and connectors like Defender 365, will only work with supported configuration depending on the data being ingested into the customer's workspace. The other types of data like Threat Intelligence (TI) data, can also be ingested into MSSP tenant.
To read part 1, please click
hereTo read part 3, please click
hereTo read part 4, please click
hereTo read part 5, please click
here
Comments
Post a Comment