To access material, start machines and answer questions login.
In the previous MS Sentinel: Deploy room, we deployed an instance of Microsoft Sentinel. The next logical phase is to plan and execute the log data ingestion process. In Microsoft Sentinel, logs are sent to Log Analytics workspaces via data connectors.
As a Microsoft Security Analyst, it is essential to know how to connect log data from different sources. The organization may have data from Microsoft and non-Microsoft resources as well as on-premise and network appliances.
Learning Objectives
In this room, we will look into the options for ingesting data and how to connect them so that Microsoft Sentinel starts to analyze and correlate logs. The main parts of this room will be:
- Data connectors
- Content hub solutions
- How to install Content hub solutions
- How to connect data connectors
Let's dive in!
Ready to learn Cyber Security?
The MS Sentinel: Ingest Data room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in