Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide

You're reading from   Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems

Arrow left icon
Product type Paperback
Published in Mar 2022
Publisher Packt
ISBN-13 9781803231891
Length 288 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Trevor Stuart Trevor Stuart
Author Profile Icon Trevor Stuart
Trevor Stuart
Joe Anich Joe Anich
Author Profile Icon Joe Anich
Joe Anich
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Section 1 – Exam Overview and Evolution of Security Operations
2. Chapter 1: Preparing for Your Microsoft Exam and SC-200 Objectives FREE CHAPTER 3. Chapter 2: The Evolution of Security and Security Operations 4. Section 2 – Implementing Microsoft 365 Defender Solutions
5. Chapter 3: Implementing Microsoft Defender for Endpoint 6. Chapter 4: Implementing Microsoft Defender for Identity 7. Chapter 5: Understanding and Implementing Microsoft Defender for Cloud (Microsoft Defender for Cloud Standard Tier) 8. Section 3 – Familiarizing Yourself with Alerts, Incidents, Evidence, and Dashboards
9. Chapter 6: An Overview: Microsoft Defender for Endpoint Alerts, Incidents, Evidence, and Dashboards 10. Chapter 7: Microsoft Defender for Identity, What Happened, Alerts, and Incidents 11. Chapter 8: Microsoft Defender for Office – Threats to Productivity 12. Chapter 9: Microsoft Defender for Cloud Apps and Protecting Your Cloud Apps 13. Section 4 – Setting Up and Connecting Data Sources to Microsoft Sentinel
14. Chapter 10: Setting Up and Configuring Microsoft Sentinel 15. Section 5 – Hunting Threats within Microsoft 365 Defender and Microsoft Sentinel
16. Chapter 11: Advanced Threat Hunting, Microsoft 365 Defender Portal, and Sentinel 17. Chapter 12: Knowledge Check 18. Other Books You May Enjoy

Connecting data sources to Microsoft Sentinel

Microsoft Sentinel will ingest data from sources and apps whenever you connect the service and decide to forward any events to Microsoft Sentinel. If you happen to have any servers that are either physical or virtual, you will be able to achieve very similar results if you install the Log Analytics agent. This will collect the required logs and send it to Microsoft Sentinel. Additionally, if you have any firewall and proxies, you will be able to use Syslog servers and have those servers forward the logs to Microsoft Sentinel.

Let's learn how to connect these data sources accordingly:

  1. From the main menu, find the Data Connectors option. Go ahead and click it to be taken to the data connectors gallery.
  2. This gallery contains a list of all the built-in data sources you can connect to! Choose the data source you would like to connect to and, in the bottom right-hand corner, select Open connector page:
...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image