Home / Case Studies / AiT SOC Sentinel Case Study · AiT SOC Sentinel · MSSP signal reconciliation

Reconcile the MSSP against ground truth.

Sentinel ingests directly from EDR, IdP, cloud control planes, and network egress — then reconciles every event against the MSSP’s ticket export. Blind spots become a list the CISO can put in front of the board.

Book a 30-Min Walkthrough
← All case studies
Product AiT SOC Sentinel — MSSP oversight + blind-spot coverage analytics
Customer Templated engagement (anonymized)
MSSP Anonymized at customer request
Posture Oversight tier — not MSSP replacement

About the customer

The customer is an organization with several hundred to several thousand endpoints across multiple locations, with security operations contracted to an MSSP under a 24x7 / business-hours / co-managed arrangement. Identity is Entra ID, Okta, or Google Workspace; EDR is CrowdStrike, SentinelOne, or Defender for Endpoint; the SIEM is Sentinel, Splunk, or the MSSP’s house platform. Security leadership reports to the CISO, IT director, or VP of IT.

MSSP relationships are political. Customer name and MSSP name are templated until written attribution is on file; the customer asked to anonymize the vendor by default.

The Challenge

The board had asked the CISO a question they couldn’t answer cleanly: “are we covered?” The MSSP delivered a monthly report with ticket counts, MTTR, and a green dashboard, but the customer’s internal team had no independent way to validate any of it. Were the tickets the MSSP closed actually closed? Were detections on the right log sources? Was anything happening on the endpoint, identity, or cloud surface that the MSSP simply wasn’t seeing because the log wasn’t piped in?

Replacing the MSSP wasn’t on the table — the contract had time remaining, renewal was scheduled, and the internal team didn’t have headcount to take SOC operations in-house. What the customer needed was an oversight tier: independent ingest of the same telemetry the MSSP was working from (plus the log sources they weren’t), with reconciliation against the MSSP’s ticket export, and a dashboard the CISO could put in front of the board.

The Solution

Intelligent IT deployed AiT SOC Sentinel against the customer’s existing telemetry stack. Sentinel ingests directly from the EDR API, the IdP audit logs, the cloud control planes (AWS, Azure, GCP, M365, Workspace), and the network egress log, then reconciles every ingested event against the MSSP’s ticket export on a nightly cadence. The reconciliation engine answers three specific questions: which events did the MSSP triage and close, which did they triage and escalate, and which never appeared in their queue at all (the blind-spot bucket).

Severity scoring uses the standard chart palette — critical in red, high in amber, informational in info-blue — carried over from the IG SaaS theme so the CISO’s board pack visually matches the rest of the IG-branded operations dashboards. The blind-spot bucket gets its own panel: each row is a log source the MSSP isn’t watching with a count of events seen in the last 30 days that, by Sentinel’s policy, would have qualified for a ticket.

Results

Outcome metrics over the first quarter / six months on AiT SOC Sentinel. Numbers below are templated; live metrics are confirmed from sentinel_event and mssp_export reconciliation tables.

[X]Tickets reconciled against MSSP queue
[X]Blind spots found (log sources MSSP wasn’t watching)
[X]%MTTR reduction vs. pre-Sentinel baseline
[X]Critical events MSSP missed and Sentinel caught
[X] hrAvg. board-pack prep time, monthly
$[X]Avoided cost of in-house SOC stand-up

All MSSP-attributed metrics use export reconciliation, not vendor-supplied dashboards.

What’s next

Phase 2 connects Sentinel directly to the IdP and EDR for active response — not just oversight — on a defined set of high-confidence detections (e.g. token theft → forced session revoke). Phase 3 expands the reconciliation engine across the customer’s vendor stack: every security tool’s alert flow gets reconciled against ground truth, not just the MSSP’s.

  • MSSP renewal armed with quantified blind-spot data and reconciled ticket history
  • Active response on top-quartile detections (forced revoke, host isolate)
  • Compliance / audit prep: Sentinel’s reconciliation log is the evidence trail
  • Co-managed SOC pivot: optionally shift from oversight to first-tier triage in-product

In their words

“Sentinel told us our MSSP wasn’t watching the M365 audit log. We renegotiated renewal with that single data point.”

— CISO, attribution pending written approval

About Intelligent IT

Intelligent IT (a brand of Intelligent Group) builds AiT SOC Sentinel as the SOC oversight tier of the AiT product suite. Sentinel doesn’t replace the MSSP — it gives the customer the independent telemetry, reconciliation, and blind-spot visibility needed to manage the MSSP relationship as a CISO rather than a passenger.

Want Sentinel oversight on your MSSP?

Pilots are scoped against your existing telemetry stack and the renewal date you’re aiming at.

Case study as of 2026-05-06. Customer attribution and live metrics pending written approval; MSSP name anonymized at customer request. Manuel Ruiz, Founder. © Intelligent Group · intelligentit.io