Microsoft Azure Sentinel: Planning and Implementing Microsofts Cloud-Native Siem Solution

Microsoft Azure Sentinel: Planning and Implementing Microsofts Cloud-Native Siem Solution

作者: Diogenes Yuri Dicola Nicholas Trull Jonathan
出版社: MicroSoft
出版在: 2020-03-17
ISBN-13: 9780136485452
ISBN-10: 0136485456
裝訂格式: Quality Paper - also called trade paper
總頁數: 208 頁





內容描述


Microsoft Azure Sentinel
 
 
Plan, deploy, and operate Azure Sentinel, Microsoft's advanced cloud-based SIEM
 
 
 
Microsoft's cloud-based Azure Sentinel helps you fully leverage advanced AI to automate threat identification and response -- without the complexity and scalability challenges of traditional Security Information and Event Management (SIEM) solutions. Now, three of Microsoft's leading experts review all it can do, and guide you step-by-step through planning, deployment, and daily operations. Leveraging in-the-trenches experience supporting early customers, they cover everything from configuration to data ingestion, rule development to incident management... even proactive threat hunting to disrupt attacks before you're exploited.
 
 
 
 
Three of Microsoft's leading security operations experts show how to:    

  • Use Azure Sentinel to respond to today's fast-evolving cybersecurity environment, and leverage the benefits of its cloud-native architecture  
  • Review threat intelligence essentials: attacker motivations, potential targets, and tactics, techniques, and procedures  
  • Explore Azure Sentinel components, architecture, design considerations, and initial configuration  
  • Ingest alert log data from services and endpoints you need to monitor  
  • Build and validate rules to analyze ingested data and create cases for investigation  
  • Prevent alert fatigue by projecting how many incidents each rule will generate  
  • Help Security Operation Centers (SOCs) seamlessly manage each incident's lifecycle  
  • Move towards proactive threat hunting: identify sophisticated threat behaviors and disrupt cyber kill chains before you're exploited  
  • Do more with data: use programmable Jupyter notebooks and their libraries for machine learning, visualization, and data analysis  
  • Use Playbooks to perform Security Orchestration, Automation and Response (SOAR)  
  • Save resources by automating responses to low-level events  
  • Create visualizations to spot trends, identify or clarify relationships, and speed decisions  
  • Integrate with partners and other third-parties, including Fortinet, AWS, and Palo Alto

作者介紹


Yuri Diogenes, Senior Program Manager at Microsoft Cybersecurity Engineering's Cloud and Artificial Intelligence Division, works closely with Azure Sentinel and Azure Security Center. Also a Professor at EC-Council University's MS and BS-level Cybersecurity programs, he holds an MS in Cybersecurity Intelligence & Forensics from Utica College, an MBA from FGF in Brazil, and several industry certifications. He is co-author of Microsoft Azure Security Center, Second Edition; Enterprise Mobility Suite: Managing BYOD and Company-Owned Devices, and other Microsoft Press books.
Nicholas DiCola is Principal Program Manager at Microsoft Cybersecurity Engineering's Cloud and Artificial Intelligence Division, where he assists customers in deploying advanced Microsoft Azure security systems. Before joining Microsoft in 2006, he was IT/Cyber Specialist on Active Duty in the U.S. Marine Corps. He was contributing author of Automating Active Directory Administration with PowerShell.
Jonathan Trull (CSSP, CISSP, CISA, OSCP) is Global Director for the Microsoft Cybersecurity Solutions Group. He leads Microsoft's team of security advisors and cloud security architects in providing strategic direction for Microsoft security offerings and engaging with customers and partners worldwide. His 20 years of information security experience includes stints as VP and CISO for Optiv; as CISO for Qualys; and as CISO for the State of Colorado. As faculty member in Regis University's information assurance graduate program, he develops and teaches courses on network forensics, security architecture and design, malware analysis, and legal concepts in information security.




相關書籍

Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone(Paperback)

作者 Steve Martinelli Henry Nash Brad Topol

2020-03-17

從 Docker 動手邁入全新 DevOps 時代:最完整 Kubernetes 全書

作者 龔正 吳治輝 閆健勇

2020-03-17

Microsoft Certified Azure Data Fundamentals Study Guide: Exam Dp-900

作者 Switzer Jake

2020-03-17