…
|
||
---|---|---|
.. | ||
Artifacts | ||
Images | ||
Modules | ||
Package | ||
README.md |
README.md
Welcome to Microsoft Sentinel Training Lab
Introduction
These labs help you get ramped up with Microsoft Sentinel and provide hands-on practical experience for product features, capabilities, and scenarios.
The lab deploys a Microsoft Sentinel workspace and ingests pre-recorded data to simulate scenarios that showcase various Microsoft Sentinel features. You should expect very little or no cost at all due to the size of the data (~10 MB), and the fact that Microsoft Sentinel offers a 30-day free trial on new workspaces.
Prerequisites
To deploy the Microsoft Sentinel Training Lab, you must have a Microsoft Azure subscription. If you do not have an existing Azure subscription, you can sign up for a free trial here.
Last release notes
- Version 1.0 - Microsoft Sentinel Training Lab
Getting started
All the modules that are part of this lab are listed below. Although in general they can be completed in any order, you must start with Module 1 as this deploys the lab environment itself.
Modules
Module 1 - Setting up the environment
- The Microsoft Sentinel workspace
- Deploy the Microsoft Sentinel Training Lab Solution
- Configure Microsoft Sentinel Playbook
- Enable Azure Activity data connector
- Enable Azure Defender data connector
- Enable Threat Intelligence TAXII data connector
- Analytics Rules overview
- Enable Microsoft incident creation rule
- Review the Fusion rule (Advanced Multistage Attack Detection)
- Create a custom analytics rule
- Review the resulting security incident
Module 4 - Incident Management
- Review Microsoft Sentinel incident tools and capabilities
- Handling the Incident "Sign-ins from IPs that attempt sign-ins to disabled accounts"
- Handling the incident "Solorigate Network Beacon"
- Hunting for more evidence
- Addding IOCs to Threat Intelligence
- Incident handover
- Hunt for a specific MITRE technique
- Bookmark hunting query results
- Promote a bookmark to an incident