SC-200: Connect logs to Microsoft Sentinel

SC-200: Connect logs to Microsoft Sentinel

Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Microsoft Sentinel. This learning path aligns with exam SC-200: Microsoft Security Operations Analyst.

Prerequisites

  • Knowledge of using KQL in Microsoft Sentinel like you could learn from learning path SC-200: Create queries for Azure Sentinel using Kusto Query Language (KQL)
  • Knowledge of Microsoft Sentinel environment configuration like you could learn from learning path SC-200: Configure your Microsoft Sentinel environment
Security Operations Analyst
Azure
Log Analytics
Microsoft Sentinel

Related Modules

Connect data to Microsoft Sentinel using data connectors
module
Intermediate   MS Learn
Azure
Log Analytics
Connect Microsoft services to Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Office 365
Connect Microsoft Defender XDR to Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Microsoft Sentinel
Connect Windows hosts to Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Sysinternals
Connect Common Event Format logs to Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Log Analytics
Connect syslog data sources to Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Log Analytics
Connect threat indicators to Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Microsoft Sentinel