Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Configure Your Microsoft Sentinel Environment

Microsoft via YouTube

Overview

Dive into a comprehensive 90-minute webinar on configuring Microsoft Sentinel environments. Explore the fundamentals of security information and event management (SIEM), understand Microsoft Sentinel's components and functionality, and learn how to set up and manage workspaces effectively. Gain insights into data connectors, log retention, analytics rules, incident investigations, automation, and threat hunting. Follow along with a live demo on creating a Microsoft Sentinel workspace and discover best practices for managing settings and configuring logs. Perfect for IT professionals looking to enhance their organization's cloud security operations.

Syllabus

- Introduction
- Learning objectives
- What is security information and event management?
- What is Microsoft Sentinel
- How Microsoft Sentinel works
- Data connectors
- Querying and log retention
- Analytics rules
- Incidents and investigations
- Automation rules and playbooks
- User entity behavior analytics
- Threat hunting and notebooks
- Threat intelligence and watchlists
- When to use Microsoft Sentinel
- Knowledge check
- Create and manage Microsoft Sentinel workspaces
- Learning objectives
- Plan for the Microsoft Sentinel workspace
- Single-tenant single workspace
- Multi=tenant workspace
- Understand Microsoft Sentinel permissions and roles
- Demo - Create a Microsoft Sentinel workspace
- Manage Microsoft Sentinel settings
- Configure logs
- Summary and conclusions

Taught by

Microsoft Developer

Reviews

Start your review of Configure Your Microsoft Sentinel Environment

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.