Category Archives: Uncategorized
41. Overview of Route53 for Multi-Site Failover Hey everyone, and welcome back. Now, in the early lectures, we were looking at various disaster recovery models that can be feasible while designing a DR for an organization. Now today we will have an overview of the demo related to the multiregional active base failure capabilities. So […]
1. Azure Virtual Desktop Security – Introduction Security is a very big area with a very big scope for COVID. And we will not cover all the security aspects in this course because this one is specialized in the Windows Virtual Desktop and not security in general. However, we will of course cover the security […]
1. Create a Pooled Host Pool In this lecture, we will use the Windows virtual desktop to create our pool host pool. Before I do that and show you how it’s done, I’d like to do a quick recap because we’ll need to review these concepts quickly because we’ll be using them right now. In […]
1. Create a new Azure VM Now let’s create a virtual machine. I will go to “virtual machines” and add a virtual machine. So this is the place where we can create it. I will create a new resource group. I will call this one the WVDVM Image Resource Group. Okay, let’s give it a […]
1. Create Storage Account Let’s create the storage account so we can then create the file share to be used with the FSLogix technology for the user profile container. I will go to create a resource-looking storage account and click on Create. I will select a resource group. I have one Profiles resource group, which […]
3. Connect Identity infrastructure to Azure AD Right now, if I go to my Azure Portal, to the Azure Active Directory, and then to users, I will see that I only have this particular user and another user. But where are the other users that I have on the domain controller? This is my domain […]
4. Entity Behaviour Analytics in Microsoft Sentinel Everyone and welcome back to my course, Security Operations Analyst, SC 200. In this lesson, we are going to talk about a capability in Microsoft Sentinel called entity behavioral analytics. cheval cheval Identifying threats within an organisation and their potential impact, whether a compromised entity or malicious insider, […]
1. Threat Detection with Microsoft Sentinel Analytics Now, using Microsoft Sentinel Analytics rules, you can basically configure notifications and alerts based on data coming from the sources that are connected to Microsoft Sentinel. This alert will help you ensure that your security operations team knows when a threat occurs and that the team can appropriately […]
1. Connect Data to Microsoft Sentinel using Data Connectors Hello everyone, and welcome back to my course, Microsoft Security Operations Analyst SC 200. Now we begin Section 7, in which we will discuss connecting, specifically connecting logs to our newly created Microsoft Sentinel. So here’s what we’ll go through: In this section, we are going […]
1. Microsoft Sentinel Overview Welcome back to my Security Operations Analyst SC 200 course. Now we are starting section six, and we can say that we are starting the other half of the course, in which we are going to focus on Microsoft Sentinel. And of course, for the rest of the course, we are […]