1. Scope of the Offer The "Iron Security Center" is a managed cybersecurity service that provides continuous monitoring, threat analysis, incident response, and expert consulting, with a focus on Microsoft Azure and Microsoft 365 environments (but not limited to them). The services include: Continuous collection and analysis of security events; Incident correlation and anomaly detection; Incident response based on predefined procedures; Periodic reporting and remediation recommendations; Technical consulting for risk assessment and security posture improvements. 2. Responsibilities of Solo Iron Deliver the contracted services according to cybersecurity best practices and using Microsoft technologies (e.g., Microsoft Sentinel, Defender for Cloud, Defender XDR); Ensure minimum service availability of 99.5% during the contract period; Notify the client of critical events in a timely manner; Maintain confidentiality of data and logs accessed during service delivery. 3. Client Responsibilities Provision the necessary Azure and Microsoft 365 resources to support service operation; Grant technical permissions required for integration of monitoring solutions; Collaborate with the response team during critical incidents; Keep contact information and internal security representatives up to date. 4. Offer Exclusions Management or maintenance of operating systems, networks, or applications not related to cybersecurity; Troubleshooting outside the scope of information security; Microsoft licensing or cloud infrastructure costs, which are the client’s responsibility. 5. Term and Termination The service contract begins on the agreed activation date and will be valid for a minimum period of 12 (twelve) months; Early termination may be subject to penalties unless due to proven breach of contract by either party. 6. Technical Support and Service Desk Support available during business hours (or 24x7, depending on the selected plan); Ticket opening via portal, email, or phone; Response and action SLAs based on incident severity. 7. Confidentiality and Data Protection All information accessed or generated during service delivery will be treated as confidential; Data handling practices comply with applicable privacy laws (e.g., LGPD) and international security standards.