• Complain

Marshall Copeland - Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services

Here you can read online Marshall Copeland - Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Apress, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Marshall Copeland Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services
  • Book:
    Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defenders many security layers.
This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden malware. You will get an overview of the MITRE Attack Matrix and its usage, followed by Azure Sentinel operations and how to continue Azure Sentinel skill improvement.
After reading this book, you will be able to protect Azure resources from cyberattacks and support XDR (Extend, Detect, Respond), an industry threat strategy through Azure Sentinel.
What You Will Learn
  • Understand Azure Sentinel technical benefits and functionality
  • Configure to support incident response
  • Integrate with Azure Security standards
  • Be aware of challenges and costs for the Azure log analytics workspace

Who This Book Is For

Security consultants, solution architects, cloud security architects, and IT security engineers

Marshall Copeland: author's other books


Who wrote Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Cloud Defense Strategies with Azure Sentinel Marshall - photo 1
Book cover of Cloud Defense Strategies with Azure Sentinel
Marshall Copeland
Cloud Defense Strategies with Azure Sentinel
Hands-on Threat Hunting in Cloud Logs and Services
1st ed.
Logo of the publisher Marshall Copeland New Braunfels TX USA ISBN - photo 2
Logo of the publisher
Marshall Copeland
New Braunfels, TX, USA
ISBN 978-1-4842-7131-5 e-ISBN 978-1-4842-7132-2
https://doi.org/10.1007/978-1-4842-7132-2
Marshall Copeland 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Apress imprint is published by the registered company APress Media, LLC part of Springer Nature.

The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.

Dedicated to the memory of Marshal (Mark) Edwin Hilley. Mark was my brother in every way. His family, friends, and extended family of first responders are mourning his passing after a battle with COVID-19. Mark Hilley was a Gulfport firefighter and Harrison County Fire Rescue Battalion Chief. District Chief Mark Hilley served more than 20 years and was also a veteran of the U.S. Marine Corps. Mark Hilley is the epitome of a firefighters firefighter. He devoted his life to public service. Please keep Marks family, wife Carla, children Natalie and Cade, and Marks mother Bonnie in your prayers.

Marshall

Introduction

The Microsoft Azure Sentinel engineering team has brought their best security work in Azure Sentinel, the cloud-native SIEM (Security Information and Event Management ). The need for the next-generation defense is to combat cybercriminals and nation states that continue to threaten human health, steal intellectual property, and terrorize businesses. Plain but certainly not simple, this is cyber war. Global cybercrime events continue to publicly remind governments, businesses, and security leaders that digital criminal efforts are ever-evolving, complex, and never-ending. Criminals in foreign countries are protected. Cyberwarfare from nation states is supported by an endless supply of resources and time.

This hands-on guidance in this book will provide you with a comprehensive understanding, enabling you, in minutes, to save money by integrating with data you already have and start defending your business today.

Target Audience
The following security roles will benefit from this book:
  • Security Operations Center (SOC) team members

  • Blue and red team members

  • Cloud security analysts

  • Network and server administrators

  • IT professionals

This book provides excellent guidance for security and IT team members who are responsible for security attack mitigation and respond to cybercriminal attacks.

Summary of Contents

A brief description of subject matter in each chapter:

Part I

Includes Chapters . You enable Azure Sentinel and begin allowing security data into your services, integrate other Azure security services with Azure Sentinel and each other, and learn how these services extend the layered data security.

Part II

Includes Chapters . You are provided guidance that includes security metrics, logs, and events based on limited data and not duplicate storage cost. Details about security threat intelligence (TI) providers and ingestion into Azure Sentinel and consideration for supporting Azure Sentinel for a global business using global Azure regions are also discussed.

Part III

Includes Chapters . Threat hunters with Azure built-in templates, automation (SOAR), and customized Kusto Query Language (KQL) queries for new threats, custom watch lists, and security defenses are discussed. There is an introduction to the MITRE organization and how it is supported in Azure Sentinel and daily, weekly, and monthly best practices for successful operations with Azure Sentinel.

Acknowledgments

Marshall Copeland would like to dedicate this book to the memory of Marshal (Mark) Edwin Hilley. His family, friends, and extended family of first responders are mourninghis passing after a battle with COVID-19. Mark Hilley was a Gulfport firefighter and Harrison County Fire Rescue Battalion Chief. District Chief Mark Hilley served morethan 20 years and was also a veteran of the U.S. Marine Corps. Mark Hilley is the epitome of a firefighters firefighter. He devoted his life to public service. Please keepMarks family in your prayers. Special acknowledgment to Brian OHara, a true security professional with great cyber defense insight. Thank you, Brian. Thank you to Shrikant Vishwakarma, Smriti Srivastava, and the Apress team for your dedication to this publication.

Table of Contents
Part I
Part II
Part III
About the Author
Marshall Copeland
is a senior consultant focused on cybersecurity in Azure public cloud Marshall - photo 3
is a senior consultant focused on cybersecurity in Azure public cloud. Marshall Copeland currently works at Microsoft Corporation supporting enterprise customers security teams using Azure security services, Azure Sentinel, Azure Security Center, and Azure Defender for hybrid network security management and data protection. He previously worked in cloud security roles at Optiv Security and Salesforce.
About the Technical Reviewer
Brian OHara
is an information security professional who has been supporting the cyber - photo 4
is an information security professional who has been supporting the cyber defense efforts of small businesses and large enterprises for more than 12 years. He has held a variety of Security Operations Center roles with responsibilities including security architecture, threat hunting, detection engineering, digital forensics, and incident response. He maintains multiple industry certifications and participates regularly in local cyber community events and conferences. He currently works as a consultant performing incident response and improving Security Operations Center efficiency through SIEM configuration auditing, alert tuning, and detection engineering.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services»

Look at similar books to Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services»

Discussion, reviews of the book Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.