From the course: Identity Threat Protection with Sentinel: Advanced Strategies
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Managing Sentinel across multiple IAM environments
From the course: Identity Threat Protection with Sentinel: Advanced Strategies
Managing Sentinel across multiple IAM environments
- [Instructor] In cybersecurity, inconsistency is the enemy. When security setups span across environments, it can create gaps that jeopardize your network, application, and identity integrity. In this case, having the ability to effectively manage Microsoft Sentinel across various identity and access management environments is important. This capability helps with maintaining security integrity in complex organizational settings, much like ensuring that every component in a sophisticated machine works perfectly to maintain optimal performance and avoid damage. First, let's discuss a foundational aspect of our security, IAM policies. These need to be comprehensive and consistent across all platforms. To achieve this, we can use infrastructure as code, tools like Azure Resource Manager, ARM templates allow us to define and deploy these configurations consistently without errors. This is an example of an ARM template to define a role assignment in Azure, granting a specific built-in…
Contents
-
-
-
-
Advanced troubleshooting in Sentinel for IAM3m 32s
-
(Locked)
Optimizing Sentinel performance for IAM4m 43s
-
(Locked)
Managing Sentinel across multiple IAM environments3m 11s
-
(Locked)
Challenge: Performance optimization for IAM Alerts44s
-
(Locked)
Solution: Performance optimization for IAM Alerts1m 54s
-
-
-