- Stay within resource usage requirements.
- Do not engage in or encourage activity that is illegal.
- Do not engage in cryptocurrency mining.
Ready for the real environment experience?
Azure Sentinel (Microsoft Sentinel) is a cloud-based SIEM (security information event management) solution that offers advanced intelligence tools across the organizations to secure the cloud and on-premises resources. The core offering of the Azure Sentinel revolves around collecting data at scale while detecting the threat in real-time using artificial intelligence to hunt the suspicious activities, ultimately performing actions to either remediate based on the preconfigured actions or provide a response plan to the security teams in an organization.
In this lab, you will create an Azure Sentinel workspace and connect it with log analytics workspace using Data Connectors to review and capture log incidents.
Upon completion of this beginner-level lab, you will be able to:
- Onboard Azure VM to Log Analytics Workspace
- Create and understand Azure Sentinel resource
- Review Data Connectors and enable Syslog collection
- Candidates for AZ-500 Azure Security Engineer Exam
- Cloud Architects
- Data Engineers
- DevOps Engineers
- Security Engineers
- Software Engineers
Familiarity with the following will be beneficial but is not required:
- Azure Virtual Machines
- Log Analytics Workspace
The following content can be used to fulfill the prerequisite:
Parveen is an Azure advocate with previous experience in the professional consulting services industries. He specializes in infrastructure and DevOps with a wide range of knowledge in security and access management. He is also an Azure Certified - DevOps Engineer Expert, Security Engineer, Developer Associate, Administrator Associate, CompTIA Certified - Network+, Security+, and AWS Cloud Practitioner.
Parveen enjoys writing about cloud technologies and sharing the knowledge with the community to help students upskill in the cloud.