Microsoft Azure Sentinel: Planning and implementing Microsoft's cloud-native SIEM solution (IT Best Practices - Microsoft Press)
β Scribed by Yuri Diogenes, Nicholas DiCola, Tiander Turpijn
- Publisher
- Microsoft Press
- Year
- 2022
- Tongue
- English
- Leaves
- 240
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Build next-generation security operations with Microsoft Sentinel
Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you step-by-step through planning, deployment, and operations, helping you use Microsoft Sentinel to escape the complexity and scalability challenges of traditional solutions. Fully updated for the latest enhancements, this edition introduces new use cases for investigation, hunting, automation, and orchestration across your enterprise and all your clouds. The authors clearly introduce each service, concisely explain all new concepts, and present proven best practices for maximizing Microsoft Sentinelβs value throughout security operations.
Β
Three of Microsoftβs leading security operations experts show how to:
- Review emerging challenges that make better cyberdefense an urgent priority
- See how Microsoft Sentinel responds by unifying alert detection, threat visibility, proactive hunting, and threat response
- Explore components, architecture, design, and initial configuration
- Ingest alerts and raw logs from all sources you need to monitor
- Define and validate rules that prevent alert fatigue
- Use threat intelligence, machine learning, and automation to triage issues and focus on high-value tasks
- Add context with User and Entity Behavior Analytics (UEBA) and Watchlists
- Hunt sophisticated new threats to disrupt cyber kill chains before youβre exploited
- Enrich incident management and threat hunting with Jupyter notebooks
- Use Playbooks to automate more incident handling and investigation tasks
- Create visualizations to spot trends, clarify relationships, and speed decisions
- Simplify integration with point-and-click data connectors that provide normalization, detection rules, queries, and Workbooks
Β
About This Book
- For cybersecurity analysts, security administrators, threat hunters, support professionals, engineers, and other IT professionals concerned with security operations
- For both Microsoft Azure and non-Azure users at all levels of experience
π SIMILAR VOLUMES
<p><span>The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements!</span></p><p><span>Microsoft Defender for Cloud</span><span> offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and st
<p><span>Proven best practices for success with every Azure networking service</span></p><p><span>For cloud environments to operate and scale optimally, their networking services must be designed, deployed, and managed well. Now, thereβs a complete, best-practice guide to doing just that. Writing fo
<p><span>Proven best practices for success with every Azure compute service!</span></p><p><span>Compute services are key to most Azure cloud solutions, but maximizing their value requires best-practice planning, design, deployment, and operations. Now, leading consultant Avinash Valiramani presents
<p><span>Proven best practices for success with every Azure monitoring and management service</span></p><p><span>For cloud environments to deliver optimal value, their monitoring and management services must be designed, deployed, and managed well. Leading cloud consultant Avinash Valiramani shows h
<p><span>Proven best practices for success with every Azure monitoring and management service</span></p><p><span>For cloud environments to deliver optimal value, their monitoring and management services must be designed, deployed, and managed well. Leading cloud consultant Avinash Valiramani shows h