From the course: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Evaluate technical threat intelligence

Evaluate technical threat intelligence

Another part of the workflow for security operations are to evaluate the technical threat intelligence of an attack. This involves the data collection and analysis of the logging and monitoring data that you send to the tool, such as Microsoft Sentinel. Here, it can apply various analytics to identify any relevant security insights and findings and then publish that through the tool. This also integrates with various products across Microsoft, whether it be Azure, Intune, Cloud App Security or other cloud applications. As part of the threat intelligence tooling, there's hunting to where teams can go through and identify the logs and the monitoring that might be relevant for an application and help the analytics rules improve overall detection.

Contents