SC-200: Configure your Microsoft Sentinel environment
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Get familiar with Microsoft Sentinel, a cloud-native, security information and event management (SIEM) service.
- Identify the various components and functionality of Microsoft Sentinel.
- Identify use cases where Microsoft Sentinel would be a good solution.
- Module 2: Create and manage Microsoft Sentinel workspaces
- Describe Microsoft Sentinel workspace architecture
- Install Microsoft Sentinel workspace
- Manage an Microsoft Sentinel workspace
- Module 3: Query logs in Microsoft Sentinel
- Use the Logs page to view data tables in Microsoft Sentinel
- Query the most used tables using Microsoft Sentinel
- Module 4: Use watchlists in Microsoft Sentinel
- Create a watchlist in Microsoft Sentinel
- Use KQL to access the watchlist in Microsoft Sentinel
- Module 5: Utilize threat intelligence in Microsoft Sentinel
- Manage threat indicators in Microsoft Sentinel
- Use KQL to access threat indicators in Microsoft Sentinel
By the end of this module, you will be able to:
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Syllabus
- Module 1: Introduction to Microsoft Sentinel
- Introduction
- What is Microsoft Sentinel?
- How Microsoft Sentinel works
- When to use Microsoft Sentinel
- Knowledge check
- Summary
- Module 2: Create and manage Microsoft Sentinel workspaces
- Introduction
- Plan for the Azure Sentinel workspace
- Create an Azure Sentinel workspace
- Manage workspaces across tenants using Azure Lighthouse
- Understand Azure Sentinel permissions and roles
- Manage Azure Sentinel settings
- Knowledge check
- Summary and resources
- Module 3: Query logs in Microsoft Sentinel
- Introduction
- Query logs in the logs page
- Understand Azure Sentinel tables
- Understand common tables
- Understand Microsoft 365 Defender tables
- Knowledge check
- Summary and resources
- Module 4: Use watchlists in Microsoft Sentinel
- Introduction
- Plan for watchlists
- Create a watchlist
- Knowledge check
- Summary and resources
- Module 5: Utilize threat intelligence in Microsoft Sentinel
- Introduction
- Define threat intelligence
- Manage your threat indicators
- View your threat indicators with KQL
- Knowledge check
- Summary and resources
Tags
Related Courses
Cloud-native security operations with Microsoft SentinelMicrosoft via Microsoft Learn Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft security solutions
Microsoft via Microsoft Learn MS-500 part 2 - Implement and manage threat protection
Microsoft via Microsoft Learn SC-200: Connect logs to Microsoft Sentinel
Microsoft via Microsoft Learn SC-200: Create detections and perform investigations using Microsoft Sentinel
Microsoft via Microsoft Learn