How to Use Threat Intelligence in Microsoft Sentinel: A Step-by-Step Guide

Опубликовано: 21 Июль 2024
на канале: IT Professor
145
1

In this video, we'll dive into how to effectively use Threat Intelligence in Microsoft Sentinel. You'll learn how to feed Indicators of Compromise (IOCs) into Sentinel, set up threat intelligence connectors, and create analytic rules to monitor and respond to threats in your environment. We will also discuss how to customize these rules to fit your specific security needs.

You'll see a detailed demonstration on importing IOCs through the Content Hub or directly via CSV/JSON uploads, and managing threat data to reduce false positives. Discover how to utilize Microsoft Defender Threat Intelligence connector to enhance your security operations center (SOC) capabilities.

We will explore query scheduling, setting up automated responses, and managing analytic rules to ensure real-time threat detection and incident response. This tutorial also covers how to handle custom indicators, making your threat intelligence more adaptable and precise.


Смотрите видео How to Use Threat Intelligence in Microsoft Sentinel: A Step-by-Step Guide онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь IT Professor 21 Июль 2024, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 14 раз и оно понравилось людям.