Threat Detection Solutions

Server    |    Expert
  • 14 videos | 1h 7m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 21 users Rating 4.2 of 21 users (21)
Discover advanced threat detection solutions for your Windows computing systems. In this course, you will examine the protective tools and features offered by Microsoft. Topics include the following: how to configure and use local and advanced audit policies, how to configure group policies such as AuditPol.exe, and the Audit PNP activity policy; how to enable and configure module, script block, and transcription logging in Windows PowerShell. Other topics include how to configure AutoGateway and Microsoft Advanced Threat Analytics, as well as how to review and edit suspicious activities on the attack time line. Finally, you will explore how to deploy and use OMS for log analytics, auditing, and security functions.

WHAT YOU WILL LEARN

  • Configure advanced audit policies
    Determine the differences and usage scenarios for using local and advanced auditing policies
    Implement auditing using group policy and auditpol.exe, and implement auditing using windows powershell
    Create expression-based audit policies
    Configure the audit pnp activity policy
    Enable and configure module, script block, and transcription logging in windows powershell
    Recognize usage and deployment scenarios for microsoft advanced threat analytics (ata)
  • Install and configure microsoft advanced threat analytics (ata) center
    Install and configure an ata gateway on a server
    Configure alerts in ata center when suspicious activity is detected
    Review and edit suspicious activities on the attack time line
    Describe the usage and deployment of operations management suite (oms) for security threat detection
    Describe operations management suite (oms) security and auditing functions and the use of log analytics in threat detection
    Describe threat detection solutions

IN THIS COURSE

  • 6m 49s
    In this video, you will learn how to configure advanced audit policies. FREE ACCESS
  • 5m 38s
    During this video, you will learn how to determine the differences and usage scenarios for using local and advanced auditing policies. FREE ACCESS
  • Locked
    3.  Auditing Using Group Policy and AuditPol.exe
    8m 31s
    In this video, you will learn how to implement auditing using Group Policy and AuditPol.exe, and how to implement auditing using Windows PowerShell. FREE ACCESS
  • Locked
    4.  Creating Expression-based Audit Policies
    5m 39s
    In this video, you will create audit policies based on expressions. FREE ACCESS
  • Locked
    5.  Configuring the Audit PNP Activity Policy
    2m 30s
    During this video, you will learn how to configure the Audit PNP activity policy. FREE ACCESS
  • Locked
    6.  Module, Script Block, and Transcription Logging
    6m 25s
    In this video, you will learn how to enable and configure module, script block, and transcription logging in Windows PowerShell. FREE ACCESS
  • Locked
    7.  Microsoft Advanced Threat Analytics (ATA)
    7m 8s
    After completing this video, you will be able to recognize usage and deployment scenarios for Microsoft Advanced Threat Analytics. FREE ACCESS
  • Locked
    8.  Installing Microsoft Advanced Threat Analytics
    2m 27s
    During this video, you will learn how to install and configure Microsoft Advanced Threat Analytics Center. FREE ACCESS
  • Locked
    9.  Installing and Configuring ATA Gateway
    2m 6s
    During this video, you will learn how to install and configure an ATA gateway on a server. FREE ACCESS
  • Locked
    10.  Configuring Alerts in ATA Center
    4m 14s
    During this video, you will learn how to configure alerts in ATA Center when suspicious activity is detected. FREE ACCESS
  • Locked
    11.  Reviewing and Editing Suspicious Activities
    4m 34s
    Learn how to review and edit suspicious activities on the timeline of the attack. FREE ACCESS
  • Locked
    12.  Using Operations Management Suite Security Solutions
    4m 7s
    After completing this video, you will be able to describe the usage and deployment of Operations Management Suite (OMS) for security threat detection. FREE ACCESS
  • Locked
    13.  Determining Threat Detection Solutions of OMS
    4m 22s
    Upon completion of this video, you will be able to describe the security and auditing functions of Operations Management Suite (OMS) and the use of log analytics in threat detection. FREE ACCESS
  • Locked
    14.  Exercise: Configure Threat Detection
    2m 34s
    After completing this video, you will be able to describe threat detection solutions. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 84 users Rating 4.4 of 84 users (84)
Rating 4.2 of 9 users Rating 4.2 of 9 users (9)
Rating 4.6 of 45 users Rating 4.6 of 45 users (45)