Microsoft Sentinel (previously, Azure Sentinel) is a cloud-based SIEM (security information event management) solution that offers advanced intelligence tools across the organizations to secure the cloud and on-premises resources. The core offering of the Azure Sentinel revolves around collecting data at scale while detecting the threat in real-time using artificial intelligence to hunt the suspicious activities, ultimately performing actions to either remediate based on the preconfigured actions or provide a response plan to the security teams in an organization.
Threat Hunting is part of the security operation lifecycle that focus on proactively capturing threats, investigating existing threat using queries, and performing changes to adapt to reduce the previous security incidents by enhancing the analytics and threat capture monitors. The pre-created queries provided by Microsoft are grouped by MITRE ATT&CK framework and tactics that let you easily use and repurpose the queries based on your organization's needs.
In this hands-on lab, you will understand how to use the Hunting dashboard to capture threats, create bookmarks and generate incidents in Microsoft Sentinel.
Upon completion of this intermediate-level lab, you will be able to:
Familiarity with the following will be beneficial but is not required:
The following content can be used to fulfill the prerequisite:
October 3rd, 2022 - Updated screenshots and instructions due to UI changes
Parveen is an Azure advocate with previous experience in the professional consulting services industries. He specializes in infrastructure and DevOps with a wide range of knowledge in security and access management. He is also an Azure Certified - DevOps Engineer Expert, Security Engineer, Developer Associate, Administrator Associate, CompTIA Certified - Network+, Security+, and AWS Cloud Practitioner.
Parveen enjoys writing about cloud technologies and sharing the knowledge with the community to help students upskill in the cloud.