Planning for integration using Azure Monitor and Azure Sentinel

  1. Home
  2. Planning for integration using Azure Monitor and Azure Sentinel

Go back to AZ-304 Tutorials

In this, we’ll understand the security concepts that include information about sophisticated attacks, volumes of alerts, and long resolution timeframes. It also includes Microsoft Azure Sentinel with concepts for providing security analysis. So, let’s learn more about this.

What is Microsoft Azure Sentinel?

  • Azure Sentinel provides intelligent security analytics at a cloud-scale for your entire enterprise. Moreover, it easily collects security data across hybrid organizations from devices to users, to servers on any cloud.  
  • Secondly, it uses the power of artificial intelligence for ensuring that you are identifying real threats quickly. In addition, it removes the burden of traditional SIEMs by eliminating the time on setting up, maintaining, and scaling infrastructure. As it is built on Azure, it offers nearly limitless cloud scale and speed to address your security needs. 
Azure Sentinel for delivering cloud-native security operations:

There are various operations for delivering cloud native security:

Easily collecting data across enterprise

Azure Sentinel can help in aggregating all security data with built-in connectors and native integration of Microsoft signals. Moreover, in just a few clicks you can import your Microsoft Office 365 data for free. And it also combines it with other security data for analysis. Azure Sentinel uses Azure Monitor. This is built on a proven and scalable log analytics database that ingests more than 10 petabytes. In addition, it provides a very fast query engine that can sort through millions of records in seconds.

Az-304 Practice tests
Analyzing and detecting threats quickly with AI 

Azure Sentinel uses scalable machine learning algorithms to correlate millions of low fidelity anomalies for presenting high fidelity security incidents to the analyst. However, these ML technologies will help you get value from large amounts of security data you are ingesting and connect the dots. These built-in machine learning models are based on the learnings from the Microsoft security team over many years of defending our customer’s cloud assets. Moreover, you do not need to be a data scientist to leverage these benefits you just turn them on.

Investigating suspicious activities

Graphical and AI-based investigation will reduce the time it takes to understand the full scope of an attack and its impact. Also, you can visualize the attack and take quick actions in the same dashboard.  

However, proactive hunting of suspicious activities is another critical task for security analysts. Often the process by which SecOps collect and analyze the data is a repeatable process that can be automated. That is to say, Azure Sentinel provides two capabilities that enable you to automate your analysis by building hunting queries and Azure Notebooks that are based on Jupyter notebooks. 

Automating common tasks and threat response 

While AI sharpens your focus on finding problems, once you have solved the problem you don’t want to keep finding the same problems over and over. That is to say, you rather want to automate response to these issues. However, Azure Sentinel provides built-in automation and orchestration with predefined or custom playbooks to solve repetitive tasks and to respond to threats quickly. Further, the Azure Sentinel will augment existing enterprise defense and investigation tools, including best-of-breed security products, homegrown tools, and other systems like HR management applications.

Azure Az-304 online course

Go back to AZ-304 Tutorials

Menu