Configure SIEM Security Operations Using Microsoft Sentinel - Applied Skills Workshop Training in Hong Kong

  • Learn via: Classroom
  • Duration: 1 Day
  • Level: Intermediate
  • Price: From €1,157+VAT
We can host this training at your preferred location. Contact us!

Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

  • Fundamental understanding of Microsoft security, compliance, and identity products
  • Intermediate understanding of Microsoft Windows
  • Familiarity with Azure services, specifically Azure Virtual Machines
  • Familiarity with Azure virtual machines and virtual networking
  • Basic understanding of scripting concepts

Module 1: Create and manage Microsoft Sentinel workspaces

Learn about the architecture of Microsoft Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements.

  • Introduction
  • Plan for the Microsoft Sentinel workspace
  • Create a Microsoft Sentinel workspace
  • Manage workspaces across tenants using Azure Lighthouse
  • Understand Microsoft Sentinel permissions and roles
  • Manage Microsoft Sentinel settings
  • Configure logs
  • Knowledge check
  • Summary and resources

Module 2: Connect Microsoft services to Microsoft Sentinel

Learn how to connect Microsoft 365 and Azure service logs to Microsoft Sentinel.

  • Introduction
  • Plan for Microsoft services connectors
  • Connect the Microsoft Office 365 connector
  • Connect the Microsoft Entra connector
  • Connect the Microsoft Entra ID Protection connector
  • Connect the Azure Activity connector
  • Knowledge check
  • Summary and resources

Module 3: Connect Windows hosts to Microsoft Sentinel

One of the most common logs to collect is Windows security events. Learn how Microsoft Sentinel makes this easy with the Security Events connector.

  • Introduction
  • Plan for Windows hosts security events connector
  • Connect using the Windows Security Events via AMA Connector
  • Connect using the Security Events via Legacy Agent Connector
  • Collect Sysmon event logs
  • Knowledge check
  • Summary and resources

Module 4: Threat detection with Microsoft Sentinel analytics

In this module, you learned how Microsoft Sentinel Analytics can help the SecOps team identify and stop cyber attacks.

  • Introduction
  • Exercise - Detect threats with Microsoft Sentinel analytics
  • What is Microsoft Sentinel Analytics?
  • Types of analytics rules
  • Create an analytics rule from templates
  • Create an analytics rule from wizard
  • Manage analytics rules
  • Exercise - Detect threats with Microsoft Sentinel analytics
  • Summary

Module 5: Automation in Microsoft Sentinel

By the end of this module, you'll be able to use automation rules in Microsoft Sentinel to automated incident management.

  • Introduction
  • Understand automation options
  • Create automation rules
  • Knowledge check
  • Summary and resources

Module 6: Configure SIEM security operations using Microsoft Sentinel

In this module, you learned how to configure SIEM security operations using Microsoft Sentinel.

  • Introduction
  • Exercise - Configure SIEM operations using Microsoft Sentinel
  • Exercise - Install Microsoft Sentinel Content Hub solutions and data connectors
  • Exercise - Configure a data connector Data Collection Rule
  • Exercise - Perform a simulated attack to validate the Analytic and Automation rules
  • Summary


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Hong Kong facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

14 January 2025 (1 Day)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
14 January 2025 (1 Day)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
14 February 2025 (1 Day)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
15 February 2025 (1 Day)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
22 February 2025 (1 Day)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
14 February 2025 (1 Day)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
09 March 2025 (1 Day)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
15 February 2025 (1 Day)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
Configure SIEM Security Operations Using Microsoft Sentinel - Applied Skills Workshop Training Course in Hong Kong

Hong Kong is officially known as the Hong Kong Special Administrative Region of the People's Republic of China (HKSAR) and is a city and special administrative region of China on the eastern Pearl River Delta in South China. Hong Kong is one of the most densely populated places in the world, with over 7.5 million population. The official languages of the HKSAR are Chinese and English. Hong Kong is a highly developed territory and ranks fourth on the United Nations Human Development Index and the residents of Hong Kong have the highest life expectancies in the world.

The best time to visit Hong Kong is from September to December, since the temperatures, averaging between 19 to 28 degree Celsius. During this outdoor activities-friendly travelling season, you can take a walk along Victoria Harbour, visit the islands of Lantau, Lamma and Cheung Chau and participate in the Mid-Autumn Festival. Top choices of the tourists to visit in Hong Kong are Big Buddha statue, Wong Tai Sin Temple, Repulse Bay and the Beaches and Hong Kong Disneyland.

Explore our diverse range of IT courses, encompassing programming, software development, cyber security, data science, business skills, and Agile/Scrum. Wherever you are in Hong Kong, our seasoned instructors will bring practical training and expert knowledge to your preferred training venue.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.