Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learn Azure Sentinel

You're reading from   Learn Azure Sentinel Integrate Azure security with artificial intelligence to build secure cloud systems

Arrow left icon
Product type Paperback
Published in Apr 2020
Publisher Packt
ISBN-13 9781838980924
Length 422 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Gary Bushey Gary Bushey
Author Profile Icon Gary Bushey
Gary Bushey
Richard Diver Richard Diver
Author Profile Icon Richard Diver
Richard Diver
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Section 1: Design and Implementation
2. Chapter 1: Getting Started with Azure Sentinel FREE CHAPTER 3. Chapter 2: Azure Monitor – Log Analytics 4. Section 2: Data Connectors, Management, and Queries
5. Chapter 3: Managing and Collecting Data 6. Chapter 4: Integrating Threat Intelligence 7. Chapter 5: Using the Kusto Query Language (KQL) 8. Chapter 6: Azure Sentinel Logs and Writing Queries 9. Section 3: Security Threat Hunting
10. Chapter 7: Creating Analytic Rules 11. Chapter 8:Introducing Workbooks 12. Chapter 9:Incident Management 13. Chapter 10: Threat Hunting in Azure Sentinel 14. Section 4: Integration and Automation
15. Chapter 11: Creating Playbooks and Logic Apps 16. Chapter 12: ServiceNow Integration 17. Section 5: Operational Guidance
18. Chapter 13: Operational Tasks for Azure Sentinel 19. Chapter 14: Constant Learning and Community Contribution 20. Assessments 21. Other Books You May Enjoy

Chapter 3: Managing and Collecting Data

One of the primary purposes of a Security Information and Event Management (SIEM) solution is to centralize the storage and analysis of security events across a diverse range of products that provide protection across your organization's IT infrastructure. To do this, the solution needs to connect to those data sources, pull the data into a central store, and manage the life cycle of that data to ensure it is available for analysis and ongoing investigations.

In this chapter, we will review the types of data that are most interesting and useful for security operations, and then explore the functionality available to connect to multiple data sources and ingest that data into Azure Sentinel by storing it in the Log Analytics workspace. Once the data is ingested, we need to ensure the appropriate configuration for data retention to maximize the ability to hunt for events and other security information, while also ensuring the cost of the...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime