•  Retrait en 2 heures
  •  Assortiment impressionnant
  •  Paiement sécurisé
  •  Toujours un magasin près de chez vous
  •  Retrait gratuit dans votre magasin Club
  •  7.000.0000 titres dans notre catalogue
  •  Payer en toute sécurité
  •  Toujours un magasin près de chez vous

Microsoft Azure Sentinel

Planning and Implementing Microsoft's Cloud-Native Siem Solution

Yuri Diogenes, Nicholas Dicola, Jonathan Trull
Livre broché | Anglais | It Best Practices - Microsoft Press
39,59 €
+ 79 points
Livraison 1 à 2 semaines
Passer une commande en un clic
Payer en toute sécurité
Livraison en Belgique: 3,99 €
Livraison en magasin gratuite

Description

Microsoft Azure Sentinel

Plan, deploy, and operate Azure Sentinel, Microsoft's advanced cloud-based SIEM


Microsoft's cloud-based Azure Sentinel helps you fully leverage advanced AI to automate threat identification and response - without the complexity and scalability challenges of traditional Security Information and Event Management (SIEM) solutions. Now, three of Microsoft's leading experts review all it can do, and guide you step by step through planning, deployment, and daily operations. Leveraging in-the-trenches experience supporting early customers, they cover everything from configuration to data ingestion, rule development to incident management... even proactive threat hunting to disrupt attacks before you're exploited.


Three of Microsoft's leading security operations experts show how to:

- Use Azure Sentinel to respond to today's fast-evolving cybersecurity environment, and leverage the benefits of its cloud-native architecture

- Review threat intelligence essentials: attacker motivations, potential targets, and tactics, techniques, and procedures

- Explore Azure Sentinel components, architecture, design considerations, and initial configuration

- Ingest alert log data from services and endpoints you need to monitor

- Build and validate rules to analyze ingested data and create cases for investigation

- Prevent alert fatigue by projecting how many incidents each rule will generate

- Help Security Operation Centers (SOCs) seamlessly manage each incident's lifecycle

- Move towards proactive threat hunting: identify sophisticated threat behaviors and disrupt cyber kill chains before you're exploited

- Do more with data: use programmable Jupyter notebooks and their libraries for machine learning, visualization, and data analysis

- Use Playbooks to perform Security Orchestration, Automation and Response (SOAR)

- Save resources by automating responses to low-level events

- Create visualizations to spot trends, identify or clarify relationships, and speed decisions

- Integrate with partners and other third-parties, including Fortinet, AWS, and Palo Alto

Spécifications

Parties prenantes

Auteur(s) :
Editeur:

Contenu

Nombre de pages :
208
Langue:
Anglais
Collection :

Caractéristiques

EAN:
9780136485452
Date de parution :
17-03-20
Format:
Livre broché
Format numérique:
Trade paperback (VS)
Dimensions :
188 mm x 231 mm
Poids :
3489 g
Librairie Club

Seulement chez Librairie Club

+ 79 points sur votre carte client de Librairie Club
Standaard Boekhandel

Les avis

Nous publions uniquement les avis qui respectent les conditions requises. Consultez nos conditions pour les avis.