Microsoft Sentinel in action: architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions
Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom thre...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
January 2022
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | FHA01 FHI01 UBY01 Volltext |
Zusammenfassung: | Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Mi... |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xvii, 459 Seiten) |
ISBN: | 9781801813587 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV047925798 | ||
003 | DE-604 | ||
005 | 20240118 | ||
007 | cr|uuu---uuuuu | ||
008 | 220412s2022 |||| o||u| ||||||eng d | ||
020 | |a 9781801813587 |c Online |9 978-1-80181-358-7 | ||
035 | |a (ZDB-221-PCL)978-1-80181-358-7 | ||
035 | |a (OCoLC)1312701102 | ||
035 | |a (DE-599)KEP077472152 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-573 |a DE-Aug4 | ||
082 | 0 | |a 004.6782 | |
100 | 1 | |a Diver, Richard |e Verfasser |4 aut | |
245 | 1 | 0 | |a Microsoft Sentinel in action |b architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions |c Richard Diver, Gary Bushey, John Perkins |
250 | |a Second edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt |c January 2022 | |
300 | |a 1 Online-Ressource (xvii, 459 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. | |
520 | 3 | |a You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. | |
520 | 3 | |a What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Mi... | |
653 | 0 | |a COMPUTERS / System Administration / Backup & Recovery | |
653 | 0 | |a COMPUTERS / Security / General | |
653 | 0 | |a COMPUTERS / Internet / Online Safety & Privacy | |
653 | 0 | |a Electronic books | |
700 | 1 | |a Bushey, Gary |e Verfasser |4 aut | |
700 | 1 | |a Perkins, John |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80181-553-6 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/obj/PACKT0006143 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-221-PCL |a ZDB-221-PPK |a ZDB-221-PCR | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033307341 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006143.html |l FHA01 |p ZDB-221-PPK |q FHA_PDA_PPK |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006143.html |l FHI01 |p ZDB-221-PCL |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/obj/PACKT0006143 |l UBY01 |p ZDB-221-PCL |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804183561342812160 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Diver, Richard Bushey, Gary Perkins, John |
author_facet | Diver, Richard Bushey, Gary Perkins, John |
author_role | aut aut aut |
author_sort | Diver, Richard |
author_variant | r d rd g b gb j p jp |
building | Verbundindex |
bvnumber | BV047925798 |
collection | ZDB-221-PCL ZDB-221-PPK ZDB-221-PCR |
ctrlnum | (ZDB-221-PCL)978-1-80181-358-7 (OCoLC)1312701102 (DE-599)KEP077472152 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04502nmm a22004811c 4500</leader><controlfield tag="001">BV047925798</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240118 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220412s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801813587</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-80181-358-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PCL)978-1-80181-358-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312701102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP077472152</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6782</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diver, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft Sentinel in action</subfield><subfield code="b">architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions</subfield><subfield code="c">Richard Diver, Gary Bushey, John Perkins</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">January 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 459 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Mi...</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / System Administration / Backup & Recovery</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Internet / Online Safety & Privacy</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bushey, Gary</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Perkins, John</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80181-553-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/obj/PACKT0006143</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCL</subfield><subfield code="a">ZDB-221-PPK</subfield><subfield code="a">ZDB-221-PCR</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033307341</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006143.html</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-221-PPK</subfield><subfield code="q">FHA_PDA_PPK</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006143.html</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/obj/PACKT0006143</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047925798 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:34:22Z |
indexdate | 2024-07-10T09:25:24Z |
institution | BVB |
isbn | 9781801813587 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033307341 |
oclc_num | 1312701102 |
open_access_boolean | |
owner | DE-706 DE-573 DE-Aug4 |
owner_facet | DE-706 DE-573 DE-Aug4 |
physical | 1 Online-Ressource (xvii, 459 Seiten) |
psigel | ZDB-221-PCL ZDB-221-PPK ZDB-221-PCR ZDB-221-PPK FHA_PDA_PPK |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt |
record_format | marc |
spelling | Diver, Richard Verfasser aut Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions Richard Diver, Gary Bushey, John Perkins Second edition Birmingham ; Mumbai Packt January 2022 1 Online-Ressource (xvii, 459 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Mi... COMPUTERS / System Administration / Backup & Recovery COMPUTERS / Security / General COMPUTERS / Internet / Online Safety & Privacy Electronic books Bushey, Gary Verfasser aut Perkins, John Verfasser aut Erscheint auch als Druck-Ausgabe 978-1-80181-553-6 https://portal.igpublish.com/iglibrary/obj/PACKT0006143 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Diver, Richard Bushey, Gary Perkins, John Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions |
title | Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions |
title_auth | Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions |
title_exact_search | Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions |
title_exact_search_txtP | Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions |
title_full | Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions Richard Diver, Gary Bushey, John Perkins |
title_fullStr | Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions Richard Diver, Gary Bushey, John Perkins |
title_full_unstemmed | Microsoft Sentinel in action architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions Richard Diver, Gary Bushey, John Perkins |
title_short | Microsoft Sentinel in action |
title_sort | microsoft sentinel in action architect design implement and operate microsoft sentinel as the core of your security solutions |
title_sub | architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions |
url | https://portal.igpublish.com/iglibrary/obj/PACKT0006143 |
work_keys_str_mv | AT diverrichard microsoftsentinelinactionarchitectdesignimplementandoperatemicrosoftsentinelasthecoreofyoursecuritysolutions AT busheygary microsoftsentinelinactionarchitectdesignimplementandoperatemicrosoftsentinelasthecoreofyoursecuritysolutions AT perkinsjohn microsoftsentinelinactionarchitectdesignimplementandoperatemicrosoftsentinelasthecoreofyoursecuritysolutions |