Use Microsoft Sentinel to Mitigate Threats
3 H 39 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Overview
- Overview
- Planning a Microsoft Sentinel Deployment
- Design and Configure a Microsoft Sentinel Workspace
- Configure Sentinel Resources
- Configure Sentinel Roles
- Plan and Implement Data Connectors in Microsoft Sentinel
- Planning for Data Sources and Data Connectors
- Data Connectors, Event Collectors, and Custom Connectors
- Manage Microsoft Sentinel Analytics Rules
- Configure Queries and Analytics Rules
- Define Incident Creation Logic
- Use Watchlists and Threat Indicators
- Perform Data Classification and Normalization
- Analyze Data Using Entities
- Create Custom Logs in Azure Log Analytics
- Develop and Manage ASIM Parsers
- Configure SOAR in Microsoft Sentinel
- Configure Automation Rules
- Use Automation in Microsoft Sentinel
- Manage Microsoft Sentinel Incidents
- Investigate Multi-Workspace Incidents
- User and Entity Behavior Analytics
- Use Microsoft Sentinel Workbooks
- Use Workbooks
- Configure Advanced Visualizations
- Hunt for Threats Using Microsoft Sentinel
- Use Hunting Queries
- Threat Hunt Using Notebooks and Bookmarks
Overview
3 M



- Episode Description
- Transcript