SC-200: Connect logs to Microsoft Sentinel
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Connect data to Microsoft Sentinel using data connectors
- Explain the use of data connectors in Microsoft Sentinel
- Describe the Microsoft Sentinel data connector providers
- Explain the Common Event Format and Syslog connector differences in Microsoft Sentinel
- Module 2: Connect Microsoft services to Microsoft Sentinel
- Connect Microsoft service connectors
- Explain how connectors auto-create incidents in Microsoft Sentinel
- Module 3: Connect Microsoft 365 Defender to Microsoft Sentinel
- Activate the Microsoft 365 Defender connector in Microsoft Sentinel
- Activate the Microsoft Defender for Endpoint connector in Microsoft Sentinel
- Activate the Microsoft Defender for Office 365 connector in Microsoft Sentinel
- Module 4: Connect Windows hosts to Microsoft Sentinel
- Connect Azure Windows Virtual Machines to Microsoft Sentinel
- Connect non-Azure Windows hosts to Microsoft Sentinel
- Configure Log Analytics agent to collect Sysmon events
- Module 5: Connect Common Event Format logs to Microsoft Sentinel
- Explain the Common Event Format connector deployment options in Microsoft Sentinel
- Run the deployment script for the Common Event Format connector
- Module 6: Connect syslog data sources to Microsoft Sentinel
- Describe the Syslog connector deployment options in Microsoft Sentinel
- Run the connector deployment script to send data to Microsoft Sentinel
- Configure the Log Analytics agent integration for Microsoft Sentinel
- Create a parse using KQL in Microsoft Sentinel
- Module 7: Connect threat indicators to Microsoft Sentinel
- Configure the TAXII connector in Microsoft Sentinel
- Configure the Threat Intelligence Platform connector in Microsoft Sentinel
- View threat indicators in Microsoft Sentinel
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Upon completion of this module, the learner will be able to:
Syllabus
- Module 1: Connect data to Microsoft Sentinel using data connectors
- Introduction
- Ingest log data with data connectors
- Understand data connector providers
- View connected hosts
- Knowledge check
- Summary and resources
- Module 2: Connect Microsoft services to Microsoft Sentinel
- Introduction
- Plan for Microsoft services connectors
- Connect the Microsoft Office 365 connector
- Connect the Azure Active Directory connector
- Connect the Azure Active Directory identity protection connector
- Knowledge check
- Summary and resources
- Module 3: Connect Microsoft 365 Defender to Microsoft Sentinel
- Introduction
- Plan for Microsoft 365 Defender connectors
- Connect alerts from Microsoft Defender for Office 365
- Connect alerts from Microsoft Defender for Endpoint
- Connect the Microsoft 365 Defender connector
- Knowledge check
- Summary and resources
- Module 4: Connect Windows hosts to Microsoft Sentinel
- Introduction
- Plan for Windows hosts security events connector
- Collect Sysmon event logs
- Knowledge check
- Summary and resources
- Module 5: Connect Common Event Format logs to Microsoft Sentinel
- Introduction
- Plan for Common Event Format connector
- Connect your external solution using the Common Event Format connector
- Knowledge check
- Summary and resources
- Module 6: Connect syslog data sources to Microsoft Sentinel
- Introduction
- Plan for the syslog connector
- Collect data from Linux-based sources using syslog
- Configure the log analytics agent
- Parse syslog data with KQL
- Knowledge check
- Summary and resources
- Module 7: Connect threat indicators to Microsoft Sentinel
- Introduction
- Plan for threat intelligence connectors
- Connect the threat intelligence TAXII connector
- Connect the threat intelligence platforms connector
- View your threat indicators with KQL
- Knowledge check
- Summary and resources
Tags
Related Courses
SC-200: Configure your Microsoft Sentinel environmentMicrosoft via Microsoft Learn SC-200: Create detections and perform investigations using Microsoft Sentinel
Microsoft via Microsoft Learn SC-200: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
Microsoft via Microsoft Learn SC-200: Mitigate threats using Microsoft Defender for Cloud
Microsoft via Microsoft Learn SC-200: Mitigate threats using Microsoft Defender for Endpoint
Microsoft via Microsoft Learn