Microsoft
Microsoft Logo

SC-200: Configure your Microsoft Sentinel environment 

  • Offered byMicrosoft

SC-200: Configure your Microsoft Sentinel environment
 at 
Microsoft 
Overview

Learn how to query the most used data tables in Microsoft Sentinel

Duration

2 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

SC-200: Configure your Microsoft Sentinel environment
 at 
Microsoft 
Course details

What are the course deliverables?
  • Learn about the architecture of Microsoft Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements
  • Learn how to create Microsoft Sentinel watchlists that are a named list of imported data
  • Learn how the Microsoft Sentinel Threat Intelligence page enables you to manage threat indicators
More about this course
  • Get started with Microsoft Sentinel by properly configuring the Microsoft Sentinel workspace
  • Traditional security information and event management (SIEM) systems typically take a long time to set up and configure
  • Microsoft Sentinel enables you to start getting valuable security insights from your cloud and on-premises data quickly

SC-200: Configure your Microsoft Sentinel environment
 at 
Microsoft 
Curriculum

Introduction to Microsoft Sentinel

Introduction

What is Microsoft Sentinel?

How Microsoft Sentinel works

When to use Microsoft Sentinel

Knowledge check

Summary

Create and manage Microsoft Sentinel workspaces

Introduction

Plan for the Microsoft Sentinel workspace

Create a Microsoft Sentinel workspace

Manage workspaces across tenants using Azure Lighthouse

Understand Microsoft Sentinel permissions and roles

Manage Microsoft Sentinel settings

Configure logs

Knowledge check

Summary and resources

Query logs in Microsoft Sentinel

Introduction

Query logs in the logs page

Understand Microsoft Sentinel tables

Understand common tables

Understand Microsoft 365 Defender tables

Knowledge check

Summary and resources

Use watchlists in Microsoft Sentinel

Introduction

Plan for watchlists

Create a watchlist

Manage watchlists

Knowledge check

Summary and resources

Utilize threat intelligence in Microsoft Sentinel

Introduction

Define threat intelligence

Manage your threat indicators

View your threat indicators with KQL

Knowledge check

Summary and resources

SC-200: Configure your Microsoft Sentinel environment
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
1 hours
Beginner
Free
4 hours
Intermediate
Free
5 hours
Beginner
View Other 1171 CoursesRight Arrow Icon

SC-200: Configure your Microsoft Sentinel environment
 at 
Microsoft 
Students Ratings & Reviews

5/5
Verified Icon1 Rating
S
SIMRAN SHARMA
SC-200: Configure your Microsoft Sentinel environment
Offered by Microsoft
5
Learning Experience: Learning experience was good
Faculty: I did training from udemy It is based on SOAR
Course Support: It has enhanced my skills in SOAR
Reviewed on 1 May 2022Read More
Thumbs Up IconThumbs Down Icon
View 1 ReviewRight Arrow Icon
qna

SC-200: Configure your Microsoft Sentinel environment
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...