Microsoft Private

Configure SIEM security operations using Microsoft Sentinel (SC-5001)

1 day
Microsoft SecurityAzure

Learn to configure Microsoft Sentinel SIEM operations: set up workspaces, connect Microsoft services and Windows events, create analytics rules, and automate re

Register or Request Training

  • Private class for your team
  • Live expert instructor
  • Online or on‑location
  • Customizable agenda
  • Proposal turnaround within 1–2 business days

Course Overview

Get started with Microsoft Sentinel security operations by configuring a Microsoft Sentinel workspace, connecting Microsoft services and Windows security events, building analytics rules, and responding to threats with automated actions.

Course Benefits

  • Create and configure a Microsoft Sentinel workspace
  • Deploy a Microsoft Sentinel content hub solution
  • Connect Windows hosts and collect security events in Microsoft Sentinel
  • Configure and manage analytics rules for threat detection
  • Configure automation to support threat response

Delivery Methods

Private Class
Delivered for your team at your site or online.

Microsoft Certified Partner

Webucator is a Microsoft Certified Partner. This class uses official Microsoft courseware and will be delivered by a Microsoft Certified Trainer (MCT).

Microsoft Certified Partner

Course Outline

  1. Create and manage Microsoft Sentinel workspaces
    1. Plan for the Microsoft Sentinel workspace
    2. Create a Microsoft Sentinel workspace
    3. Manage workspaces across tenants using Azure Lighthouse
    4. Understand Microsoft Sentinel permissions and roles
    5. Manage Microsoft Sentinel settings
    6. Configure logs
    7. Module assessment
  2. Connect Microsoft services to Microsoft Sentinel
    1. Plan for Microsoft services connectors
    2. Connect the Microsoft 365 connector
    3. Connect the Microsoft Entra connector
    4. Connect the Microsoft Entra ID Protection connector
    5. Connect the Azure Activity connector
    6. Module assessment
  3. Connect Windows hosts to Microsoft Sentinel
    1. Plan for Windows hosts security events connector
    2. Connect using the Windows Security Events via AMA Connector
    3. Connect using the Security Events via Legacy Agent Connector
    4. Collect Sysmon event logs
    5. Module assessment
  4. Threat detection with Microsoft Sentinel analytics
    1. What is Microsoft Sentinel Analytics?
    2. Types of analytics rules
    3. Create an analytics rule from templates
    4. Create an analytics rule from wizard
    5. Manage analytics rules
  5. Automation in Microsoft Sentinel
    1. Understand automation options
    2. Create automation rules
    3. Module assessment
  6. Configure SIEM security operations using Microsoft Sentinel

Class Materials

Each student receives a comprehensive set of materials, including course notes and all class examples.

Class Prerequisites

Experience in the following is required for this Microsoft Security class:

  • Fundamental understanding of Microsoft Azure
  • Basic understanding of Microsoft Sentinel
  • Experience using Kusto Query Language (KQL) in Microsoft Sentinel

Have questions about this course?

We can help with curriculum details, delivery options, pricing, or anything else. Reach out and we’ll point you in the right direction.

}