Introduction
                                    
                                        Need a central point of analysis for security events?
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        What you should know
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Lab setup
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                1. Introduction and Concepts
                                    
                                        Sentinel feature flyover
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Onboarding Microsoft Sentinel
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Kusto query language quickstart
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                2. Configuring Microsoft Sentinel
                                    
                                        Connecting Microsoft services
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Connecting external services
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Integrating threat intelligence
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                3. Threat Detection, Investigation, and Response
                                    
                                        Detecting threats
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Investigating incidents
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Responding to threats using automation
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Security orchestration, automation, and response (SOAR)
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        UEBA and machine learning
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                4. Advanced Threat Hunting Scenarios
                                    
                                        Threat hunting basics
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Hunting with bookmarks
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Hunting with notebooks
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Workbooks and dashboards
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Integrating with Microsoft Defender and Purview
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                     
                        
                                
                                    Ex_Files_Implementing_Administering_Microsoft_Sentinel_2023.zip
                                    
                                        (18 KB)