Configure SIEM security operations using Microsoft Sentinel (SC-5001)
Begin your journey with Microsoft Sentinel security operations by setting up the Microsoft Sentinel workspace, integrating Microsoft services and Windows security events, configuring analytics rules, and addressing threats using automated responses.
- May 09, 2025 - May 09, 20251 Days - Live Online - PST
08:00 AM - 04:00 PM PSTGuaranteed To Run - Sep 19, 2025 - Sep 19, 20251 Days - Live Online - PST
08:00 AM - 04:00 PM PSTGuaranteed To Run
Begin your journey with Microsoft Sentinel security operations by setting up the Microsoft Sentinel workspace, integrating Microsoft services and Windows security events, configuring analytics rules, and addressing threats using automated responses.
More Information:
- Learning Style: Virtual
- Technology: Microsoft
- Difficulty: Intermediate
- Course Duration: 1 Day
- Course Info: Download PDF
- Certificate: See Sample
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information
About This Course:
Start your journey with Microsoft Sentinel security operations by setting up and configuring the Microsoft Sentinel workspace to serve as the central hub for monitoring and managing security events. Connect various Microsoft services, such as Azure and Microsoft 365, along with Windows security event logs, to ensure comprehensive data collection and visibility across your environment. Configure advanced analytics rules to detect potential threats, streamline threat detection processes, and identify anomalous activities. Enhance your security posture by implementing automated response mechanisms that allow for swift and efficient threat mitigation, reducing response times and minimizing risk
Course Objectives:
-
Plan for the Microsoft Sentinel workspace
-
Create a Microsoft Sentinel workspace
-
Manage workspaces across tenants using Azure Lighthouse
-
Understand Microsoft Sentinel permissions and roles
-
Manage Microsoft Sentinel settings
-
Configure logs
-
Plan for Microsoft services connectors
-
Connect the Microsoft Office 365 connector
-
Connect the Microsoft Entra connector
-
Connect the Microsoft Entra ID Protection connector
-
Connect the Azure Activity connector
-
Plan for Windows hosts security events connector
-
Connect using the Windows Security Events via AMA Connector
-
Connect using the Security Events via Legacy Agent Connector
-
Collect Sysmon event logs
-
What is Microsoft Sentinel Analytics?
-
Types of analytics rules
-
Create an analytics rule from templates
-
Create an analytics rule from wizard
-
Manage analytics rules
-
Understand automation options
-
Create automation rules
Audience:
-
Security Operations Analysts
-
Security Engineers
-
IT Administrators
Prerequisites:
-
Fundamental understanding of Microsoft Azure
-
Basic understanding of Microsoft Sentinel
-
Experience using Kusto Query Language (KQL) in Microsoft Sentinel