Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

SC-200: Configure your Microsoft Sentinel environment

Microsoft via Microsoft Learn

Overview

  • Module 1: Get familiar with Microsoft Sentinel, a cloud-native, security information and event management (SIEM) service.
  • By the end of this module, you will be able to:

    • Identify the various components and functionality of Microsoft Sentinel.
    • Identify use cases where Microsoft Sentinel would be a good solution.
  • Module 2: Create and manage Microsoft Sentinel workspaces
  • Upon completion of this module, the learner will be able to:

    • Describe Microsoft Sentinel workspace architecture
    • Install Microsoft Sentinel workspace
    • Manage an Microsoft Sentinel workspace
  • Module 3: Query logs in Microsoft Sentinel
  • Upon completion of this module, the learner will be able to:

    • Use the Logs page to view data tables in Microsoft Sentinel
    • Query the most used tables using Microsoft Sentinel
  • Module 4: Use watchlists in Microsoft Sentinel
  • Upon completion of this module, the learner will be able to:

    • Create a watchlist in Microsoft Sentinel
    • Use KQL to access the watchlist in Microsoft Sentinel
  • Module 5: Utilize threat intelligence in Microsoft Sentinel
  • Upon completion of this module, the learner will be able to:

    • Manage threat indicators in Microsoft Sentinel
    • Use KQL to access threat indicators in Microsoft Sentinel

Syllabus

  • Module 1: Introduction to Microsoft Sentinel
    • Introduction
    • What is Microsoft Sentinel?
    • How Microsoft Sentinel works
    • When to use Microsoft Sentinel
    • Knowledge check
    • Summary
  • Module 2: Create and manage Microsoft Sentinel workspaces
    • Introduction
    • Plan for the Azure Sentinel workspace
    • Create an Azure Sentinel workspace
    • Manage workspaces across tenants using Azure Lighthouse
    • Understand Azure Sentinel permissions and roles
    • Manage Azure Sentinel settings
    • Knowledge check
    • Summary and resources
  • Module 3: Query logs in Microsoft Sentinel
    • Introduction
    • Query logs in the logs page
    • Understand Azure Sentinel tables
    • Understand common tables
    • Understand Microsoft 365 Defender tables
    • Knowledge check
    • Summary and resources
  • Module 4: Use watchlists in Microsoft Sentinel
    • Introduction
    • Plan for watchlists
    • Create a watchlist
    • Knowledge check
    • Summary and resources
  • Module 5: Utilize threat intelligence in Microsoft Sentinel
    • Introduction
    • Define threat intelligence
    • Manage your threat indicators
    • View your threat indicators with KQL
    • Knowledge check
    • Summary and resources

Reviews

Start your review of SC-200: Configure your Microsoft Sentinel environment

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.