Configure Your Microsoft Sentinel Environment

Configure Your Microsoft Sentinel Environment

Microsoft Developer via YouTube Direct link

- Introduction

1 of 25

1 of 25

- Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Configure Your Microsoft Sentinel Environment

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction
  2. 2 - Learning objectives
  3. 3 - What is security information and event management?
  4. 4 - What is Microsoft Sentinel
  5. 5 - How Microsoft Sentinel works
  6. 6 - Data connectors
  7. 7 - Querying and log retention
  8. 8 - Analytics rules
  9. 9 - Incidents and investigations
  10. 10 - Automation rules and playbooks
  11. 11 - User entity behavior analytics
  12. 12 - Threat hunting and notebooks
  13. 13 - Threat intelligence and watchlists
  14. 14 - When to use Microsoft Sentinel
  15. 15 - Knowledge check
  16. 16 - Create and manage Microsoft Sentinel workspaces
  17. 17 - Learning objectives
  18. 18 - Plan for the Microsoft Sentinel workspace
  19. 19 - Single-tenant single workspace
  20. 20 - Multi=tenant workspace
  21. 21 - Understand Microsoft Sentinel permissions and roles
  22. 22 - Demo - Create a Microsoft Sentinel workspace
  23. 23 - Manage Microsoft Sentinel settings
  24. 24 - Configure logs
  25. 25 - Summary and conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.