NOTE: a Level 400 Training on Azure is available
Azure Sentinel in a sentence: a cloud Native SIEM (a SaaS solution)
But, what does cloud native mean?
Azure Sentinel: Syslog, CEF, Logstash and other 3rd party connectors grand list
Azure Sentinel: Collecting logs from Microsoft Services and Applications
Azure Sentinel Agent: Collecting telemetry from on-prem and IaaS servers
Built-in workbooks provide integrated data from your connected data sources to let you deep dive into the events generated in the collected data.
Using tempaltes you are able to build your own custom workbooks.
Sentinel allows you to detect threats using
After data sources are connected to Azure Sentinel, you want to be notified when something suspicious happens. This is where rules come into play. There are several rule templates available which were designed by Microsoft's team of security experts.
When a rule is triggered, an Incident gets generated. An incident is a collection of releted alerts, events and bookmarks.
Incidents can be forwarded / integrated to an existing ticketing systems (for example Service Now)
using the investigation GUI you can further investigate an Incident.