From the course: Implementing and Administering Microsoft Sentinel

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Next steps

Next steps

- [Pete] Thanks for joining me for implementing and configuring Microsoft Sentinel. I hope you've gathered a few valuable tips and techniques for implementing Sentinel and proactive hunting in your own environment. We've covered a lot of ground in this course. We began with a look at Sentinel features. We then moved into onboarding and configuring your Sentinel instance, including connecting Microsoft and external data sources. Next, we learned how to establish threat detection and automated response in Sentinel. And finally, we explored threat hunting with the portal, bookmarks and Jupyter notebooks. I'd love to hear about your lingering questions as you continue to explore Sentinel on your own. Feel free to connect with me on LinkedIn any time for a chat.

Contents