Released
11/14/2019- Onboarding Azure Sentinel
- Connecting Microsoft and third-party services
- Connecting to threat intelligence resources
- Detecting suspicious activities
- Investigating cases
- Responding to threats
- Hunting for security threats in your environment
- Building custom dashboards
Skill Level Intermediate
Duration
Views
- [Pete] Azure Sentinel, Microsoft's new cloud-based security information and event management offering brings new capabilities to Azure as a central point of aggregation and analysis of security events, regardless of source. Data ingestion is where it all begins, and we'll cover how to connect Microsoft and third party data sources to Sentinel. Then, we'll look at how to configure rules to detect and alert on anomalous activity in your environment. Our journey wouldn't be complete without exploring how to investigate incidents and proactively hunt for suspicious activities, both natively in Sentinel, and with some clever integration to opensource solutions. Then we'll finish our trip with a look at visualizing all of this data to deliver clear insights in an easy to consume format. Hi, I'm Pete Zerger, consultant, speaker, author, and Microsoft MVP, and I'm excited to take this journey with you in the latest installment of my Microsoft cybersecurity series here on LinkedIn Learning, so grab your gear and buckle up because we're about to take off.
Share this video
Embed this video
Video: An introduction to Azure Sentinel