Skip to content

Commit ee4c304

Browse files
authored
Merge pull request #51105 from KenMAG/main
Adding new unit with a simulation exercise
2 parents c50a271 + 7572ae2 commit ee4c304

13 files changed

+131
-10
lines changed

learn-pr/wwl-sci/.openpublishing.redirection.wwl-sci.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -372,6 +372,11 @@
372372
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/9-summary-resources/",
373373
"redirect_document_id": false
374374
},
375+
{
376+
"source_path_from_root": "/learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/6-summary.yml",
377+
"redirect_url": "https://learn.microsoft.com/training/modules/configure-siem-security-operations-using-microsoft-sentinel/7-summary/",
378+
"redirect_document_id": false
379+
},
375380
{
376381
"source_path": "learn-pr/wwl-azure/purview-implement-manage-retention/auto-apply-retention-label.md",
377382
"redirect_url": "/training/modules/purview-manage-records/auto-apply-retention-label",

learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/1-introduction.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Configure a Security Information and Event Management (SIEM) for Security Operations using Microsoft Sentinel."
7-
ms.date: 10/3/2023
8-
author: wwlpublish
7+
ms.date: 06/25/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
durationInMinutes: 5
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.configure-siem-security-operations-using-microsoft-sentinel-labs-simulation.exercise
3+
title: Exercise - Connect Microsoft Sentinel to Microsoft Defender XDR
4+
metadata:
5+
title: Exercise - Connect Microsoft Sentinel to Microsoft Defender XDR
6+
description: "Run a simulation exercise to connect a Microsoft Sentinel workspace to the Microsoft Defender portal."
7+
ms.date: 6/25/2025
8+
author: KenMAG
9+
ms.author: kelawson
10+
ms.topic: unit
11+
durationInMinutes: 15
12+
content: |
13+
[!include[](includes/6-exercise.md)]

learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/6-summary.yml renamed to learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/7-summary.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Summary
44
metadata:
55
title: Summary
66
description: "Provides a summary of configuring a Security information and event management (SIEM) for Security Operations using Microsoft Sentinel."
7-
ms.date: 04/01/2025
8-
author: wwlpublish
7+
ms.date: 06/25/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
durationInMinutes: 5
1212
content: |
13-
[!include[](includes/6-summary.md)]
13+
[!include[](includes/7-summary.md)]

learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/includes/1-introduction.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,3 +8,4 @@ After completing this module, you'll be able to:
88
- Deploy Microsoft Sentinel Content Hub solutions and data connectors
99
- Configure Microsoft Sentinel Data Collection rules, NRT Analytic rule and Automation
1010
- Perform a simulated attack to validate Analytic and Automation rules
11+
- Connect Microsoft Sentinel to Microsoft Defender XDR.
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
You're a Security Operations Analyst working at a company that deployed both Microsoft Defender XDR and Microsoft Sentinel. You need to prepare for the Unified Security Operations Platform connecting Microsoft Sentinel to Defender XDR.
2+
3+
In this exercise, you perform the following tasks:
4+
5+
- Install the Microsoft Defender XDR Content Hub solution.
6+
- Deploy the Microsoft Sentinel connector to connect Microsoft Sentinel to Microsoft Defender XDR.
7+
- Connect Microsoft Sentinel to Microsoft Defender XDR.
8+
- Explore the Microsoft Sentinel capabilities in the Microsoft Defender XDR portal.
9+
10+
> [!NOTE]
11+
>The environment for this exercise is a simulation generated from the product. As a limited simulation, links on a page may not be enabled and text-based inputs that fall outside of the specified script may not be supported. A pop-up message displays stating, "This feature isn't available within the simulation." When this occurs, select OK and continue the exercise steps.
12+
>
13+
>
14+
>:::image type="content" source="../media/simulation-pop-up-error.png" alt-text="Screenshot of pop-up screen indicating that this feature isn't available within the simulation.":::
15+
16+
### Task 1: Connect Defender XDR
17+
18+
In this task, you deploy the Microsoft Defender XDR connector.
19+
20+
1. In the Microsoft Edge browser, open the simulated environment by selecting this link: **[Azure portal]( https://app.highlights.guide/start/1c894b46-4b0a-40cb-b0f0-1e1c86c615f3?token=16d48b6c-eace-4a1f-8050-098d29d23a89)**.
21+
22+
1. In the Search bar of the Azure portal, type *Sentinel*, then select **Microsoft Sentinel**.
23+
24+
1. On the *Microsoft Sentinel* page, select the **Woodgrove-LogAnalyiticWorkspace** Workspace.
25+
26+
1. In the Microsoft Sentinel navigation menu, scroll down to and expand the **Content management** section. Then select **Content Hub**.
27+
28+
1. In the *Content hub*, search for the **Microsoft Defender XDR** solution and select it from the list.
29+
30+
1. On the *Microsoft Defender XDR* solution details page, select **Install**.
31+
32+
1. When the installation completes, search for the **Microsoft Defender XDR** solution and select it.
33+
34+
1. On the *Microsoft Defender XDR* solution details page, select **Manage**
35+
36+
1. Select the *Microsoft Defender XDR* Data connector check-box, and select **Open connector page**.
37+
38+
1. In the *Configuration* section, under the *Instructions* tab, select the **Connect incidents & alerts** button.
39+
40+
1. You should see a message that the connection was successful.
41+
42+
### Task 2: Connect Microsoft Sentinel and Microsoft Defender XDR
43+
44+
In this task, you continue with the simulation and connect a Microsoft Sentinel workspace to Microsoft Defender XDR.
45+
46+
1. Navigate back to the Microsoft Sentinel *Content Hub* (using the "breadcrumb" menu link at the top of the page), and select **Overview (Preview)** from the navigation menu General section.
47+
48+
1. Select the **Learn more** button on the *Get your SIEM and XDR in one place* message.
49+
50+
:::image type="content" source="../media/siem-xdr-learn-more.png" alt-text="Screen capture of SIEM and XDR Learn more button message." lightbox="../media/siem-xdr-learn-more.png":::
51+
52+
1. Selecting the **Learn more** button opens a new tab in the browser for the *Microsoft Defender XDR* portal.
53+
54+
1. On the **Defender Defender** portal **Home** screen, you should see a banner at the top with the message, *Get your SIEM and XDR in one place*. Select the **Connect a workspaces** button.
55+
56+
:::image type="content" source="../media/siem-xdr-connect-workspace.png" alt-text="Screen capture of Defender XDR Connect a workspace button." lightbox="../media/siem-xdr-connect-workspace.png":::
57+
58+
1. On the *Choose a workspace* page, select the **woodgrove-loganalyiticsworkspace** Microsoft Sentinel workspace.
59+
60+
1. Select the **Next** button.
61+
62+
1. On the **Set a primary workspace** page, you should see the **woodgrove-loganalyiticsworkspace** Microsoft Sentinel workspace in the drop-down menu. Select the **Next** button.
63+
64+
1. On the *Review and finish* page, verify that the *Workspace* selection is correct and review the bulleted items under the *What to expect when the workspace is connected* section. Select the **Connect** button.
65+
66+
1. You should see a *You're about to connect a workspace* message. Select the **Connect** button.
67+
68+
1. You should now be on the *Workspace successfully connected* page.
69+
70+
1. Select the **Close** button.
71+
72+
:::image type="content" source="../media/successfully-connected-close-button.png" alt-text="Screen capture of the Defender XDR workspace successfully connected page." lightbox="../media/successfully-connected-close-button.png":::
73+
74+
1. On the **Defender XDR** portal **Home** screen, you should see a banner at the top with the message, *Your unified SIEM and XDR is ready*. Select the **Start Hunting** button.
75+
76+
1. In *Advanced hunting*, you should see a message to "Explore your content from Microsoft Sentinel". In the *Advanced hunting* navigation menu, you can find the *Microsoft Sentinel* tables, functions, and queries under the corresponding tabs.
77+
78+
1. Scroll down under the **Schema** tab to the **Microsoft Sentinel** heading, and then double-click the **ThreatIntelligenceIndicator** table.
79+
80+
1. In the *Query* pane, you should see a (KQL) query that returns threat intelligence indicators. Select the **Run query** button.
81+
82+
:::image type="content" source="../media/advanced-hunting-sentinel-query.png" alt-text="Screen capture of Defender XDR Sentinel Advanced hunting tables." lightbox="../media/advanced-hunting-sentinel-query.png":::
83+
84+
1. Expand the left main menu pane if collapsed and expand the new **Microsoft Sentinel** menu items. You should see *Search*, *Threat management*, *Content management*, and *Configuration* selections.
85+
86+
> [!NOTE]
87+
> Be aware that there are capability differences between the Azure Microsoft Sentinel portal and Sentinel in the Microsoft Defender XDR portal **[Portal capability differences](/azure/sentinel/microsoft-sentinel-defender-portal#capability-differences-between-portals)**.
88+
89+
1. From the Microsoft Defender XDR **Microsoft Sentinel** menu items, then select **Configuration** and then **Data connectors**.
90+
91+
1. In the *Data connectors* page, you should see the **Azure Activity** and other data connectors listed with a status of **Connected**.
92+
93+
> [!NOTE]
94+
> Feel free to explore and compare the other Microsoft Sentinel capabilities, but as this is a simulation, your ability to explore Microsoft Sentinel in the Microsoft Defender portal is limited. In a real environment, you would be able to explore the full Microsoft Sentinel capabilities in the Microsoft Defender portal.
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,21 @@
1-
You should have learned how data is sent to the Microsoft Sentinel workspace by configuring the provided data connectors. And how the included data connectors are for Microsoft 365 services, Azure, and third-party specific.
1+
You learned how data is sent to the Microsoft Sentinel workspace by configuring the provided data connectors. And how the included data connectors are for Microsoft 365 services, Azure, and third-party specific.
22

33
You should now be able to:
44

55
- Explain the use of data connectors in Microsoft Sentinel
66
- Understand how data connectors are installed from Microsoft Sentinel Content Hub Solutions
77
- Describe the Microsoft Sentinel data connector providers
88
- Explain the Common Event Format and Syslog connector differences in Microsoft Sentinel
9+
- Connect Microsoft Defender XDR with Microsoft Sentinel
910

1011
## Learn more
1112

1213
You can learn more by reviewing the following.
1314

1415
[Deploy and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy)
1516

17+
[Connect Microsoft Sentinel to Microsoft Defender portal](/unified-secops-platform/microsoft-sentinel-onboard)
18+
1619
[Become a Microsoft Sentinel Ninja](https://techcommunity.microsoft.com/t5/azure-sentinel/become-an-azure-sentinel-ninja-the-complete-level-400-training/ba-p/1246310?azure-portal=true)
1720

1821
[Microsoft Tech Community Security Webinars](https://techcommunity.microsoft.com/t5/microsoft-security-and/security-community-webinars/ba-p/927888?azure-portal=true)

learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/index.yml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ uid: learn.wwl.configure-siem-security-operations-using-microsoft-sentinel-labs
33
metadata:
44
title: Configure SIEM security operations using Microsoft Sentinel
55
description: "Configure security information and event management (SIEM) security operations using Microsoft Sentinel."
6-
ms.date: 04/01/2025
7-
author: wwlpublish
6+
ms.date: 06/25/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module-guided-project
1010
ms.service: microsoft-sentinel
@@ -15,12 +15,15 @@ abstract: |
1515
Upon completion of this module, the learner is able to:
1616
- Create and configure a Microsoft Sentinel workspace
1717
- Deploy Microsoft Sentinel Content Hub solutions and data connectors
18-
- Configure Microsoft Sentinel Data Collection rules, NRT Analytic rule and Automation
18+
- Configure Microsoft Sentinel Data Collection rules, NRT Analytic rule, and Automation
1919
- Perform a simulated attack to validate Analytic and Automation rules
20+
- Run a simulation exercise to connect a Microsoft Sentinel workspace to the Microsoft Defender portal
2021
prerequisites: |
22+
- An Azure subscription
2123
- Basic experience with Azure services
2224
- Basic knowledge of operational concepts, such as monitoring, logging, and alerting
23-
- An Azure subscription
25+
- Basic experience with Microsoft Defender
26+
- Familiarity with security operations concepts, such as incident response and threat detection
2427
iconUrl: /learn/achievements/generic-badge.svg
2528
levels:
2629
- intermediate
@@ -30,6 +33,7 @@ products:
3033
- azure
3134
- microsoft-sentinel
3235
- azure-log-analytics
36+
- microsoft-defender
3337
subjects:
3438
- threat-protection
3539
- cloud-security
@@ -39,6 +43,7 @@ units:
3943
- learn.wwl.configure-siem-security-operations-using-microsoft-sentinel-labs-deploy.exercise
4044
- learn.wwl.configure-siem-security-operations-using-microsoft-sentinel-labs-validate.exercise
4145
- learn.wwl.configure-siem-security-operations-using-microsoft-sentinel-labs-perform.exercise
46+
- learn.wwl.configure-siem-security-operations-using-microsoft-sentinel-labs-simulation.exercise
4247
- learn.wwl.configure-siem-security-operations-using-microsoft-sentinel-labs.summary
4348
badge:
4449
uid: learn.wwl.configure-siem-security-operations-using-microsoft-sentinel-labs.badge
Loading
Loading

0 commit comments

Comments
 (0)