From the course: Implementing and Administering Microsoft Sentinel
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Next steps
From the course: Implementing and Administering Microsoft Sentinel
Next steps
- [Pete] Thanks for joining me for implementing and configuring Microsoft Sentinel. I hope you've gathered a few valuable tips and techniques for implementing Sentinel and proactive hunting in your own environment. We've covered a lot of ground in this course. We began with a look at Sentinel features. We then moved into onboarding and configuring your Sentinel instance, including connecting Microsoft and external data sources. Next, we learned how to establish threat detection and automated response in Sentinel. And finally, we explored threat hunting with the portal, bookmarks and Jupyter notebooks. I'd love to hear about your lingering questions as you continue to explore Sentinel on your own. Feel free to connect with me on LinkedIn any time for a chat.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.