Summary
In this chapter, we reviewed the importance of data quality and using the seven Vs of big data as a guide to selecting the right data. We also looked at the various data connectors available to retrieve logs from a wide variety of sources, and the importance of constantly reviewing the connectors for updates and additional resources, such as workbooks. You now have the skills required to set up data connectors to begin ingesting data for later use in analysis and threat hunting.
Ongoing data management plays a key part in this solution, ensuring you maintain the cost efficiency of the solution without losing valuable information that can help identify risk and mitigate potential loss. Use the information in this chapter to apply to your own environment, and review regularly.
In the next chapter, you will learn how to integrate threat intelligence feeds into Microsoft Sentinel, to enrich your data with insights from security experts and make your investigations more effective...