Microsoft
Microsoft Logo

SC-200: Connect logs to Microsoft Sentinel 

  • Offered byMicrosoft

SC-200: Connect logs to Microsoft Sentinel
 at 
Microsoft 
Overview

Learn how to connect Microsoft 365 and Azure service logs to Microsoft Sentinel

Duration

3 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

SC-200: Connect logs to Microsoft Sentinel
 at 
Microsoft 
Course details

What are the course deliverables?
  • Learn about the configuration options and data provided by Microsoft Sentinel connectors for Microsoft 365 Defender
  • Learn how Microsoft Sentinel makes this easy with the Security Events connector
  • Learn about the Common Event Format (CEF) connector's configuration options
  • Learn about the Syslog connector's configuration options which will enable you to parse Syslog data
  • Learn how to connect Threat Intelligence Indicators to the Microsoft Sentinel workspace using the provided data connectors
More about this course
  • Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Microsoft Sentinel
  • This learning path aligns with exam SC-200: Microsoft Security Operations Analyst
  • The primary approach to connect log data is using the Microsoft Sentinel provided data connectors

SC-200: Connect logs to Microsoft Sentinel
 at 
Microsoft 
Curriculum

Connect data to Microsoft Sentinel using data connectors

Introduction

Ingest log data with data connectors

Understand data connector providers

View connected hosts

Knowledge check

Summary and resources

Connect Microsoft services to Microsoft Sentinel

Introduction

Plan for Microsoft services connectors

Connect the Microsoft Office 365 connector

Connect the Azure Active Directory connector

Connect the Azure Active Directory identity protection connector

Connect the Azure Activity connector

Knowledge check

Summary and resources

Connect Microsoft 365 Defender to Microsoft Sentinel

Introduction

Plan for Microsoft 365 Defender connectors

Connect the Microsoft 365 Defender connector

Connect Microsoft Defender for Cloud connector

Connect Microsoft Defender for IoT

Connect Microsoft Defender legacy connectors

Knowledge check

Summary and resources

Connect Windows hosts to Microsoft Sentinel

Introduction

Plan for Windows hosts security events connector

Connect using the Windows Security Events via AMA Connector

Connect using the Security Events via Legacy Agent Connector

Collect Sysmon event logs

Knowledge check

Summary and resources

Connect Common Event Format logs to Microsoft Sentinel

Introduction

Plan for Common Event Format connector

Connect your external solution using the Common Event Format connector

Knowledge check

Summary and resources

Connect syslog data sources to Microsoft Sentinel

Introduction

Plan for the syslog connector

Collect data from Linux-based sources using syslog

Configure the log analytics agent

Parse syslog data with KQL

Knowledge check

Summary and resources

Connect threat indicators to Microsoft Sentinel

Introduction

Plan for threat intelligence connectors

Connect the threat intelligence TAXII connector

Connect the threat intelligence platforms connector

View your threat indicators with KQL

Knowledge check

Summary and resources

SC-200: Connect logs to Microsoft Sentinel
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
4 hours
Intermediate
Free
5 hours
Beginner
Free
1 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

SC-200: Connect logs to Microsoft Sentinel
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...