From the course: Microsoft Security Operations Analyst Associate (SC-200) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Learning objectives
From the course: Microsoft Security Operations Analyst Associate (SC-200) Cert Prep by Microsoft Press
Learning objectives
- Welcome to lesson 14, hunt for threats by using Microsoft Sentinel. We start by analyzing attack vector coverage by using the miter attack in Microsoft Sentinel. Then we look at customizing content gallery hunting queries. Next, you learn how to use hunting bookmarks for data investigations and see how to monitor hunting queries by using livestream. Lastly, you see how to retrieve and manage archive log data and create and manage search jobs well. That's our plan to hunt for threats in this lesson. Let's begin.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Learning objectives53s
-
(Locked)
Analyze attack vector coverage using the MITRE ATT&CK in Microsoft Sentinel8m 46s
-
(Locked)
Customize content gallery hunting queries8m 35s
-
(Locked)
Use hunting bookmarks for data investigations4m 5s
-
(Locked)
Monitor hunting queries using Livestream3m 32s
-
(Locked)
Retrieve and manage archived log data4m 19s
-
(Locked)
Create and manage search jobs7m 54s
-
(Locked)
-
-