Microsoft Sentinel in Action : Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions

Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you integrate cloud security and artificial intelligence (AI). This book will teach you how to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic.

The first part of this book will introduce you to Microsoft Sentinel and Log Analytics, then move on to understanding data collection and management, as well as how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. The next part will focus on useful features, such as entity behavior analytics and Microsoft Sentinel playbooks, along with exploring the new bi-directional connector for ServiceNow. In the next part, you’ll be learning how to develop solutions that automate responses needed to handle security incidents and find out more about the latest developments in security, techniques to enhance your cloud security architecture, and explore how you can contribute to the security community.

By the end of this book, you’ll have learned how to implement Microsoft Sentinel to fit your needs and protect your environment from cyber threats and other security issues.

Aloita tämä kirja jo tänään, hintaan 0 €

  • Kokeilujakson aikana käytössäsi on kaikki sovelluksen kirjat
  • Ei sitoumusta, voit perua milloin vain
Kokeile nyt ilmaiseksi
Yli 52 000 ihmistä on antanut Nextorylle viisi tähteä App Storessa ja Google Playssä.

Muut ovat myös lukeneet

Ohita lista
  1. A Day in the Life of a CISO : Personal Mentorship from 24+ Battle-Tested CISOs — Mentoring We Never Got

    David J. Gee

  2. Mastering Windows Security and Hardening : Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats

    Mark Dunkerley, Matt Tumbarello

  3. Penetration Testing Azure for Ethical Hackers : Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

    David Okeyode, Karl Fosaaen

  4. 4.2

    Building a Second Brain : A Proven Method to Organize Your Digital Life and Unlock Your Creative Potential

    Tiago Forte

  5. Mastering Windows Security and Hardening : Secure and protect your Windows environment from cyber threats using zero-trust security principles

    Matt Tumbarello, Mark Dunkerley

  6. Microsoft Defender for Endpoint in Depth : Take any organization's endpoint security to the next level

    Justen Graves, Joe Anich, Paul Huijbregts

  7. A CISO Guide to Cyber Resilience : A how-to guide for every CISO to build a resilient security program

    Debra Baker

  8. 4.0

    The CISO Evolution : Business Knowledge for Cybersecurity Executives

    Matthew K. Sharp, Kyriakos Lambros

  9. 5.0

    Työpaikan tietoturvaopas - Tunnista uhat, hallitse riskit

    Petteri Järvinen, Kimmo Rousku

  10. 4.2

    Hyvät hakkerit : Ada Lovelacesta Linus Torvaldsiin

    Linus Nyman

  11. 3.3

    Digiyrittäjän käsikirja : Opas menestyksekkään digiajan konsulttibisneksen perustamiseen, pyörittämiseen ja kasvattamiseen

    Mikko Raespuro

  12. 4.3

    The PARA Method : Simplify, Organize, and Master Your Digital Life

    Tiago Forte


Liittyvät kategoriat