Configure Your Microsoft Sentinel Environment
Offered By: Microsoft via YouTube
Course Description
Overview
Syllabus
- Introduction
- Learning objectives
- What is security information and event management?
- What is Microsoft Sentinel
- How Microsoft Sentinel works
- Data connectors
- Querying and log retention
- Analytics rules
- Incidents and investigations
- Automation rules and playbooks
- User entity behavior analytics
- Threat hunting and notebooks
- Threat intelligence and watchlists
- When to use Microsoft Sentinel
- Knowledge check
- Create and manage Microsoft Sentinel workspaces
- Learning objectives
- Plan for the Microsoft Sentinel workspace
- Single-tenant single workspace
- Multi=tenant workspace
- Understand Microsoft Sentinel permissions and roles
- Demo - Create a Microsoft Sentinel workspace
- Manage Microsoft Sentinel settings
- Configure logs
- Summary and conclusions
Taught by
Microsoft Developer
Tags
Related Courses
Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft security solutionsMicrosoft via Microsoft Learn SC-200: Configure your Microsoft Sentinel environment
Microsoft via Microsoft Learn SC-200: Connect logs to Microsoft Sentinel
Microsoft via Microsoft Learn SC-200: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
Microsoft via Microsoft Learn SC-200: Perform threat hunting in Microsoft Sentinel
Microsoft via Microsoft Learn