♫musicjinni

Enable and configure Analytics rules in Microsoft Sentinel | Free Lab Walkthrough - Module 3

video thumbnail
This is a series about Microsoft Sentinel, modern Security operations center (SOC) series for Security Engineers and SOC Analysts. Learn how to setup and configure Sentinel for free with the trial offer.


In this video I go through Module 3 covering Analytics Rules.


Here's the lab guide for you to follow along: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Training/Azure-Sentinel-Training-Lab/Modules/Module-1-Setting-up-the-environment.md


Find the playlist here: https://www.youtube.com/watch?v=utXr6C_UV28&list=PLn_e1t8tt2VrcsdRp51dZ6y30xrpMszKq


Here's something else to look at: https://medium.com/microsoftazure/everything-you-need-to-get-started-with-architecting-and-design-microsoft-sentinel-2022-3acef10e1542


Follow me on LinkedIn and medium: https://linktree.com/acamillo


#cybersecurity #microsoft #sentinel

Enable and configure Analytics rules in Microsoft Sentinel | Free Lab Walkthrough - Module 3

How to Use Bookmarks in Microsoft Sentinel | Free Lab Walkthrough - Module 5

How to Use Watchlists in Microsoft Sentinel - Flexible Analytics | Free Lab Walkthrough - Module 6

Azure Sentinel Overview | Azure Sentinel Training | Live batches | Limited seat

Using Threat Intelligence in Microsoft Sentinel - Connectors, Logs | Free Lab Walkthrough - Module 7

Microsoft Sentinel for SAP Threat Monitoring Demo and Configuration Guides

What's Next in Microsoft Sentinel - March 2022

Learn Live - Configure your Microsoft Sentinel environment

A Day in the Life of an Azure Sentinel Analyst

SC-200 Exam Day 3 | Microsoft Security Operations Analyst Certification Guide | Updated May 2022

Learn Live: Threat response with Microsoft Sentinel playbooks | CLL94

Azure Security Center webinar: Enhance IoT security with Azure Defender and Azure Sentinel

Better Together: Microsoft Sentinel - IT/OT Threat Monitoring with Defender for IoT Solution

7 SOC Process Framework Technology processes and procedures Final

ASC webinar: Enhance IoT Security & Visibility with Azure Defender and Azure Sentinel

Ten Strategies of a World-Class Security Operations Center

Cyber Threat Workshop - Adversary Attribution: Fingerprint Adversary-Threat Infrastructure

Navigating the New Cyber Paradigm: How to Address the Dangers of Social Engineering

Disclaimer DMCA