Completed
- Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Configure Your Microsoft Sentinel Environment
Automatically move to the next video in the Classroom when playback concludes
- 1 - Introduction
- 2 - Learning objectives
- 3 - What is security information and event management?
- 4 - What is Microsoft Sentinel
- 5 - How Microsoft Sentinel works
- 6 - Data connectors
- 7 - Querying and log retention
- 8 - Analytics rules
- 9 - Incidents and investigations
- 10 - Automation rules and playbooks
- 11 - User entity behavior analytics
- 12 - Threat hunting and notebooks
- 13 - Threat intelligence and watchlists
- 14 - When to use Microsoft Sentinel
- 15 - Knowledge check
- 16 - Create and manage Microsoft Sentinel workspaces
- 17 - Learning objectives
- 18 - Plan for the Microsoft Sentinel workspace
- 19 - Single-tenant single workspace
- 20 - Multi=tenant workspace
- 21 - Understand Microsoft Sentinel permissions and roles
- 22 - Demo - Create a Microsoft Sentinel workspace
- 23 - Manage Microsoft Sentinel settings
- 24 - Configure logs
- 25 - Summary and conclusions