- Connect data to Microsoft Sentinel using data connectors
Upon completion of this module, the learner is able to:
- Describe how to install Content Hub Solutions to provision Microsoft Sentinel Data connectors
- Explain the use of data connectors in Microsoft Sentinel
- Describe the Microsoft Sentinel data connector providers
- Explain the Common Event Format and Syslog connector differences in Microsoft Sentinel
- Connect Microsoft services to Microsoft Sentinel
Upon completion of this module, the learner is able to:
- Connect Microsoft service connectors
- Explain how connectors auto-create incidents in Microsoft Sentinel
- Connect Microsoft Defender XDR to Microsoft Sentinel
Upon completion of this module, the learner is able to:
- Understand the connectivity options for the Microsoft Defender XDR connector when Microsoft Sentinel is onboarded to Defender XDR, versus Microsoft Sentinel in the Azure portal
- Activate the Microsoft Defender XDR connector in Microsoft Sentinel
- Activate the Microsoft Defender for Cloud connector in Microsoft Sentinel
- Activate the Microsoft Defender for IoT connector in Microsoft Sentinel
- Connect Windows hosts to Microsoft Sentinel
Upon completion of this module, the learner is able to:
- Connect Azure Windows Virtual Machines to Microsoft Sentinel
- Connect non-Azure Windows hosts to Microsoft Sentinel
- Install and configure a data connector to collect Sysmon events
- Connect Common Event Format logs to Microsoft Sentinel
Upon completion of this module, the learner will be able to:
- Explain the Common Event Format connector deployment options in Microsoft Sentinel
- Run the deployment script for the Common Event Format connector
- Connect syslog data sources to Microsoft Sentinel
Upon completion of this module, the learner is able to:
- Describe the Azure Monitor Agent Data Collection Rule (DCR) for Syslog
- Install and Configure the Azure Monitor Linux Agent extension with the Syslog DCR
- Run the Azure Arc Linux deployment and connection scripts
- Verify Syslog log data is available in Microsoft Sentinel
- Create a parser using KQL in Microsoft Sentinel
- Connect threat indicators to Microsoft Sentinel
Upon completion of this module, the learner is able to:
- Configure the Defender Threat Intelligence connector in Microsoft Sentinel
- Configure the TAXII connector in Microsoft Sentinel
- Configure the Threat Intelligence Upload API connector in Microsoft Sentinel
- View threat indicators in Microsoft Sentinel
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Connect data to Microsoft Sentinel using data connectors
- Introduction
- Ingest log data with data connectors
- Understand data connector providers
- View connected hosts
- Module assessment
- Summary and resources
- Connect Microsoft services to Microsoft Sentinel
- Introduction
- Plan for Microsoft services connectors
- Connect the Microsoft 365 connector
- Connect the Microsoft Entra connector
- Connect the Microsoft Entra ID Protection connector
- Connect the Azure Activity connector
- Module assessment
- Summary and resources
- Connect Microsoft Defender XDR to Microsoft Sentinel
- Introduction
- Plan for Microsoft Defender XDR connectors
- Connect the Microsoft Defender XDR connector
- Connect Microsoft Defender for Cloud connector
- Connect Microsoft Defender for IoT
- Connect Microsoft Defender legacy connectors
- Module assessment
- Summary and resources
- Connect Windows hosts to Microsoft Sentinel
- Introduction
- Plan for Windows hosts security events connector
- Connect using the Windows Security Events via AMA Connector
- Connect using the Security Events via Legacy Agent Connector
- Collect Sysmon event logs
- Module assessment
- Summary and resources
- Connect Common Event Format logs to Microsoft Sentinel
- Introduction
- Plan for Common Event Format connector
- Connect your external solution using the Common Event Format connector
- Module assessment
- Summary and resources
- Connect syslog data sources to Microsoft Sentinel
- Introduction
- Plan for syslog data collection
- Collect data from Linux-based sources using syslog
- Configure the Data Collection Rule for Syslog Data Sources
- Parse syslog data with KQL
- Module assessment
- Summary and resources
- Connect threat indicators to Microsoft Sentinel
- Introduction
- Plan for threat intelligence connectors
- Connect the Defender Threat Intelligence connector
- Connect the threat intelligence TAXII connector
- Connect the threat intelligence Upload API connector
- View your threat indicators with KQL
- Module assessment
- Summary and resources