- What is security information and event management?
4
- What is Microsoft Sentinel
5
- How Microsoft Sentinel works
6
- Data connectors
7
- Querying and log retention
8
- Analytics rules
9
- Incidents and investigations
10
- Automation rules and playbooks
11
- User entity behavior analytics
12
- Threat hunting and notebooks
13
- Threat intelligence and watchlists
14
- When to use Microsoft Sentinel
15
- Knowledge check
16
- Create and manage Microsoft Sentinel workspaces
17
- Learning objectives
18
- Plan for the Microsoft Sentinel workspace
19
- Single-tenant single workspace
20
- Multi=tenant workspace
21
- Understand Microsoft Sentinel permissions and roles
22
- Demo - Create a Microsoft Sentinel workspace
23
- Manage Microsoft Sentinel settings
24
- Configure logs
25
- Summary and conclusions
Description:
Dive into a comprehensive 90-minute webinar on configuring Microsoft Sentinel environments. Explore the fundamentals of security information and event management (SIEM), understand Microsoft Sentinel's components and functionality, and learn how to set up and manage workspaces effectively. Gain insights into data connectors, log retention, analytics rules, incident investigations, automation, and threat hunting. Follow along with a live demo on creating a Microsoft Sentinel workspace and discover best practices for managing settings and configuring logs. Perfect for IT professionals looking to enhance their organization's cloud security operations.