Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Azure Architecture Explained

You're reading from   Azure Architecture Explained A comprehensive guide to building effective cloud solutions

Arrow left icon
Product type Paperback
Published in Sep 2023
Publisher Packt
ISBN-13 9781837634811
Length 446 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (3):
Arrow left icon
Brett Hargreaves Brett Hargreaves
Author Profile Icon Brett Hargreaves
Brett Hargreaves
David Rendón David Rendón
Author Profile Icon David Rendón
David Rendón
MJ Parker MJ Parker
Author Profile Icon MJ Parker
MJ Parker
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Part 1 – Effective and Efficient Security Management and Operations in Azure
2. Chapter 1: Identity Foundations with Azure Active Directory and Microsoft Entra FREE CHAPTER 3. Chapter 2: Managing Access to Resources Using Azure Active Directory 4. Chapter 3: Using Microsoft Sentinel to Mitigate Lateral Movement Paths 5. Part 2 – Architecting Compute and Network Solutions
6. Chapter 4: Understanding Azure Data Solutions 7. Chapter 5: Migrating to the Cloud 8. Chapter 6: End-to-End Observability in Your Cloud and Hybrid Environments 9. Chapter 7: Working with Containers in Azure 10. Chapter 8: Understanding Networking in Azure 11. Chapter 9: Securing Access to Your Applications 12. Part 3 – Making the Most of Infrastructure-as-Code for Azure
13. Chapter 10: Governance in Azure – Components and Services 14. Chapter 11: Building Solutions in Azure Using the Bicep Language 15. Chapter 12: Using Azure Pipelines to Build Your Infrastructure in Azure 16. Chapter 13: Continuous Integration and Deployment in Azure DevOps 17. Chapter 14: Tips from the Field 18. Index 19. Other Books You May Enjoy

Using Microsoft Sentinel to Mitigate Lateral Movement Paths

This chapter explains Microsoft Sentinel’s capabilities to detect and investigate advanced security threats, compromised identities, and potentially malicious actions in our organization.

Lateral movement is a technique used by cyber attackers to move across a network once they have gained access to one device. Microsoft Sentinel is a tool that helps to detect and respond to cyber threats.

In this chapter, we will review how organizations can identify suspicious activity and prevent lateral movement by setting up alerts and automated responses to potential threats using Microsoft Sentinel, helping to protect a network from cyberattacks and keep sensitive information safe.

By using Microsoft Sentinel to mitigate lateral movement paths, you can detect and prevent attackers from moving from one device to another within a network. This is important because once an attacker gains access to one device, they can use...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime