From the course: Microsoft Security Operations Analyst Associate (SC-200) Cert Prep by Microsoft Press

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Learning objectives

Learning objectives

- Welcome to lesson 14, hunt for threats by using Microsoft Sentinel. We start by analyzing attack vector coverage by using the miter attack in Microsoft Sentinel. Then we look at customizing content gallery hunting queries. Next, you learn how to use hunting bookmarks for data investigations and see how to monitor hunting queries by using livestream. Lastly, you see how to retrieve and manage archive log data and create and manage search jobs well. That's our plan to hunt for threats in this lesson. Let's begin.

Contents