Microsoft Sentinel (previously, Azure Sentinel) is a cloud-based SIEM (security information event management) solution that offers advanced intelligence tools across the organizations to secure the cloud and on-premises resources. The core offering of the Azure Sentinel revolves around collecting data at scale while detecting the threat in real-time using artificial intelligence to hunt the suspicious activities, ultimately performing actions to either remediate based on the preconfigured actions or provide a response plan to the security teams in an organization.
Threat Hunting is part of the security operation lifecycle that focus on proactively capturing threats, investigating existing threat using queries, and performing changes to adapt to reduce the previous security incidents by enhancing the analytics and threat capture monitors. The pre-created queries provided by Microsoft are grouped by MITRE ATT&CK framework and tactics that let you easily use and repurpose the queries based on your organization's needs.
In this hands-on lab, you will understand how to use the Hunting dashboard to capture threats, create bookmarks and generate incidents in Microsoft Sentinel.
Upon completion of this intermediate-level lab, you will be able to:
Familiarity with the following will be beneficial but is not required:
The following content can be used to fulfill the prerequisite:
January 31st, 2024 - Updated screenshots and instructions due to UI changes
October 3rd, 2022 - Updated screenshots and instructions due to UI changes