SC-200: Configure your Microsoft Sentinel environment
- Offered byMicrosoft
SC-200: Configure your Microsoft Sentinel environment at Microsoft Overview
Duration | 2 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
SC-200: Configure your Microsoft Sentinel environment at Microsoft Course details
- Learn about the architecture of Microsoft Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements
- Learn how to create Microsoft Sentinel watchlists that are a named list of imported data
- Learn how the Microsoft Sentinel Threat Intelligence page enables you to manage threat indicators
- Get started with Microsoft Sentinel by properly configuring the Microsoft Sentinel workspace
- Traditional security information and event management (SIEM) systems typically take a long time to set up and configure
- Microsoft Sentinel enables you to start getting valuable security insights from your cloud and on-premises data quickly
SC-200: Configure your Microsoft Sentinel environment at Microsoft Curriculum
Introduction to Microsoft Sentinel
Introduction
What is Microsoft Sentinel?
How Microsoft Sentinel works
When to use Microsoft Sentinel
Knowledge check
Summary
Create and manage Microsoft Sentinel workspaces
Introduction
Plan for the Microsoft Sentinel workspace
Create a Microsoft Sentinel workspace
Manage workspaces across tenants using Azure Lighthouse
Understand Microsoft Sentinel permissions and roles
Manage Microsoft Sentinel settings
Configure logs
Knowledge check
Summary and resources
Query logs in Microsoft Sentinel
Introduction
Query logs in the logs page
Understand Microsoft Sentinel tables
Understand common tables
Understand Microsoft 365 Defender tables
Knowledge check
Summary and resources
Use watchlists in Microsoft Sentinel
Introduction
Plan for watchlists
Create a watchlist
Manage watchlists
Knowledge check
Summary and resources
Utilize threat intelligence in Microsoft Sentinel
Introduction
Define threat intelligence
Manage your threat indicators
View your threat indicators with KQL
Knowledge check
Summary and resources
SC-200: Configure your Microsoft Sentinel environment at Microsoft Entry Requirements
Other courses offered by Microsoft
SC-200: Configure your Microsoft Sentinel environment at Microsoft Students Ratings & Reviews
- 4-51