Microsoft Sentinel : Analytics Rules | Threat Detection | Scheduled Rules | Anomaly | Azure Sentinel

Опубликовано: 20 Октябрь 2025
на канале: CyberPlatter
1,780
46

Welcome to our Microsoft Sentinel Series! 🚀 Our goal is to help you become an expert in Microsoft Sentinel through practical, hands-on demos.

Microsoft Sentinel Series Playlist:    • Microsoft Sentinel Full Course | Microsoft...  

In this chapter, we will explore the threat detection in Microsoft Sentinel.
What are Analytics Rules?
How Analytics Rules Enable Threat Detection
Types of Analytics Rules
Scheduled Rules
Near-Real-Time (NRT) Rules
Anomaly Rules
Microsoft Security Rules
Threat Intelligence Rules
Fusion (Advanced Multistage Attack Detection) Rules
Machine Learning (ML) Behavior Analytics Rules

Demo on Each Rule Type
Step-by-step creation process
Practical utilization and best practices

Chapter 1: Microsoft Sentinel Architecture:    • Microsoft Sentinel Tutorial: Introduction,...  
Chapter 2: Microsoft Sentinel Deployment and RBAC:    • Microsoft Sentinel Tutorial: Microsoft Sen...  
Chapter 3: Microsoft Sentinel Content Hub and Data Connectors:    • Microsoft Sentinel Tutorial: Microsoft Sen...  
Chapter 4: Connecting Entra ID to Microsoft Sentinel:    • Microsoft Sentinel Tutorial: Entra ID inte...  
Chapter 5: Threat Detection and Mitigation Workflow in Microsoft Sentinel:    • Microsoft Sentinel Tutorial: Threat Detect...  
Chapter 6 - Threat Intelligence in Microsoft Sentinel:    • Microsoft Sentinel : Threat Intelligence |...  
Chapter 7: Microsoft Sentinel : Analytics Rules | Threat Detection:    • Microsoft Sentinel : Analytics Rules | Thr...  
Chapter 8: Microsoft Sentinel User & Entity Behavior Analytics UEBA​:    • Microsoft Sentinel User & Entity Behavior ...  
Chapter 9: Ingest logs to Microsoft Sentinel using Azure Monitor Agent (AMA) :    • Microsoft Sentinel |Ingest logs to Sentine...  
Chapter 10: Microsoft Sentinel Automated Responses: Automation Rules and Playbooks: Microsoft Sentinel SOAR Solution:    • Microsoft Sentinel | Automated Responses t...  
Chapter 11: Microsoft Sentinel Workbooks | Data Visualization in Microsoft Sentinel:    • Microsoft Sentinel Workbooks | Data Visual...  
Chapter 12: Microsoft Sentinel Watchlists:    • Microsoft Sentinel Watchlists | How Micros...  
Chapter 13: Microsoft Sentinel Notebooks | How to Investigate Threats with Jupyter & MSTICPy:    • Microsoft Sentinel Notebooks | How to Inve...  
Chapter 14: Microsoft Sentinel Incident Response:    • Microsoft Sentinel Incident Response: How ...  
Chapter 15: Threat Hunting in Microsoft Sentinel | KQL, Hunting Queries & Live Demos:    • Threat Hunting in Microsoft Sentinel | KQL...  

SIEM Interview Questions and Answers Part 1 -    • SIEM Interview Questions and Answers | Par...  
SIEM Interview Questions and Answers Part 2 -    • SIEM Interview Questions and Answers | Par...  

Whether you're a beginner or looking to deepen your understanding, this series is designed to provide valuable insights and actionable knowledge. Stay tuned for more chapters packed with demos and in-depth tutorials!

🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated!

#cyberplatter #cybersecurity #security #securityconcepts #SIEM #SOAR #securitytools #securitytraining #cybersecuritytraining #securitytutorial #cybersecuritytutorial #cybersecsec #cybersecurityexperts #cybersecurityforbeginners #microsoftsecurity #microsoftsentinel #microsoft #azure #azuresecurity #threatintelligence

Microsoft Sentinel Training
Microsoft Sentinel Tutorial
Microsoft Sentinel Full Course