توضیحاتی در مورد کتاب Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services
نام کتاب : Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services
ویرایش : 1
عنوان ترجمه شده به فارسی : استراتژیهای دفاع ابری با Azure Sentinel: شکار عملی تهدید در گزارشها و خدمات ابری
سری :
نویسندگان : Marshall Copeland
ناشر : Apress
سال نشر : 2021
تعداد صفحات : 289
ISBN (شابک) : 1484271319 , 9781484271315
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 15 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Table of Contents
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
Part I
Chapter 1: Azure Sentinel Overview
Azure Sentinel Platform Benefits
Azure Deployment Recommendations
Global Design and Cost Preparation
Azure Sentinel Enablement
Azure Logs
Azure Metrics
Data Ingestion
Summary
Chapter 2: Other Azure Security Services
Azure Log Analytics
Azure Monitor
Azure Security Center
Enable Security
Microsoft Defender for Endpoint
Microsoft Defender for Identity
Summary
Chapter 3: Getting Started with Azure Sentinel and XDR Capabilities
Security Operations Center with Azure Sentinel and XDR
Azure Sentinel SIEM and Azure Security
Azure Sentinel Prioritization
Microsoft 365 Defender, XDR
Security Road Map
Summary
Part II
Chapter 4: Sentinel Data Connection
Azure Control Plane and Data Plane
Native Data Connectors
Log Analytics Storage Options
Industry Leaders’ Third-Party Data
Kusto Query Language
Threat Intelligence – TAXII Integration
Summary
Chapter 5: Threat Intelligence
Threat Intelligence
Communicating Using STIX and TAXII
Options for Threat Intelligence
Implementing Microsoft Threat Intelligence
Other Considerations for Threat Intelligence
Summary
Chapter 6: Multi-tenant Architecture
Azure Design: Single and Multi-tenant
Single-Workspace Considerations
Multi-workspace Considerations
Azure Security Platform
Summary
Part III
Chapter 7: Kusto Query Language and Threat Hunting
Where Does Azure Data Reside
Kusto Query Language Training
Introduction to the Kusto Query Language
Threat Hunting with Azure Sentinel
Summary
Chapter 8: Introduction to the MITRE Matrix
MITRE ATT&CK
CISO Summary
Cybersecurity Threats
Current Security Facts
Microsoft Security Intelligence Report (SIR)
2021 Verizon Data Breach Investigations Report (DBIR) Update
Ponemon Institute: IBM Sponsored
Cisco Annual Cybersecurity Report
FireEye M-Trends 2021 Annual Security Report
Secure Cloud Steps
Azure Cloud Networking, Encryption, and Data Storage
Identity Multi-factor Authentication (MFA)
Software Is a Key Vulnerability
OWASP, Security Development Lifecycle (SDLC)
Finding Cloud Blind Spots Improves Your Network Security Knowledge
NVD Use with ITIL/Change Management Patching
Security Responsibility Model
Summary
Chapter 9: Azure Sentinel Operations
Modern Security Operations Center Structure
Workbooks
Playbooks
Notebooks
Log Management
Summary
Index