- Learn Azure Sentinel
- Richard Diver Gary Bushey Jason S. Rader
- 207字
- 2021-06-30 15:08:17
Chapter 2: Azure Monitor – Log Analytics
In this chapter, we will explore the Azure Monitor Log Analytics platform, which is used to store all the log data that will be analyzed by Azure Sentinel. This is the first component that needs to be designed and configured when implementing Azure Sentinel, and will require some ongoing maintenance to configure the data storage options and control the costs associated with the solution.
This chapter will also explain how to create a new workspace using the Azure portal, PowerShell, and the CLI. Once a workspace has been created, we will learn how to attach various resources to it so that information can be gathered, and we will explore the other navigation menu options.
By the end of this chapter you will know how to set up a new workspace, connect to resources to gather data, enable Azure Sentinel for data analysis, and configure some of the advanced features to ensure security and cost management.
We will cover the following topics in this chapter:
- Introduction to Azure Monitor Log Analytics
- Planning a workspace
- Creating a workspace
- Managing permissions of the workspace
- Enabling Azure Sentinel
- Exploring the Azure Sentinel Overview page
- Connecting your first data source
- Advanced settings for Log Analytics
- Kali Linux Social Engineering
- Getting Started with FortiGate
- 移動APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- Digital Forensics with Kali Linux
- 軟件安全保障體系架構(gòu)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- Learning Pentesting for Android Devices
- 捍衛(wèi)隱私
- 物聯(lián)網(wǎng)信息安全技術(shù)
- Android Application Security Essentials
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 黑客攻防入門
- 黑客攻防從入門到精通:實(shí)戰(zhàn)篇(第2版)