Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide

You're reading from   Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems

Arrow left icon
Product type Paperback
Published in Mar 2022
Publisher Packt
ISBN-13 9781803231891
Length 288 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Trevor Stuart Trevor Stuart
Author Profile Icon Trevor Stuart
Trevor Stuart
Joe Anich Joe Anich
Author Profile Icon Joe Anich
Joe Anich
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Section 1 – Exam Overview and Evolution of Security Operations
2. Chapter 1: Preparing for Your Microsoft Exam and SC-200 Objectives FREE CHAPTER 3. Chapter 2: The Evolution of Security and Security Operations 4. Section 2 – Implementing Microsoft 365 Defender Solutions
5. Chapter 3: Implementing Microsoft Defender for Endpoint 6. Chapter 4: Implementing Microsoft Defender for Identity 7. Chapter 5: Understanding and Implementing Microsoft Defender for Cloud (Microsoft Defender for Cloud Standard Tier) 8. Section 3 – Familiarizing Yourself with Alerts, Incidents, Evidence, and Dashboards
9. Chapter 6: An Overview: Microsoft Defender for Endpoint Alerts, Incidents, Evidence, and Dashboards 10. Chapter 7: Microsoft Defender for Identity, What Happened, Alerts, and Incidents 11. Chapter 8: Microsoft Defender for Office – Threats to Productivity 12. Chapter 9: Microsoft Defender for Cloud Apps and Protecting Your Cloud Apps 13. Section 4 – Setting Up and Connecting Data Sources to Microsoft Sentinel
14. Chapter 10: Setting Up and Configuring Microsoft Sentinel 15. Section 5 – Hunting Threats within Microsoft 365 Defender and Microsoft Sentinel
16. Chapter 11: Advanced Threat Hunting, Microsoft 365 Defender Portal, and Sentinel 17. Chapter 12: Knowledge Check 18. Other Books You May Enjoy

Enabling and onboarding Microsoft Sentinel

At this point, all of the heavy prerequisite lifting is complete! You will be thrilled to know that enabling and onboarding Microsoft Sentinel is rather easy! It normally comes down to the planning and costing discussions you have already had, which makes this a bit more time-consuming.

To begin, we recommend leveraging the wide variety of connectors that Microsoft provides from its solutions, as well as gallery-based connectors (for example, Palo Alto Network Firewalls). This will be the quickest way to onboard your data source into Microsoft Sentinel.

Some recommended starting points are as follows:

  • Microsoft 365 Defender (formerly Microsoft Threat Protection)
  • Microsoft 365 data sources
  • Office 365 data sources
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Cloud
  • Azure Active Directory Identity Protection
  • Azure Activity
  • Syslog
  • Common Event Format (CEF) connectors
  • REST APIs
...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime