Skip to main Content

Masterclass: Implementing and Managing Microsoft Advanced Threat Analytics

  • Code training ATA
  • Duur 3 dagen

Extra betaalopties

  • GTC’s 37 (incl. BTW)

    Global Training Credits: neem contact met ons op voor meer informatie

Klassikale training Prijs

eur2.575,00

(excl. BTW)

Vraag een groepstraining aan Schrijf je in

Methode

Deze training is in de volgende formats beschikbaar:

  • Class Connect

    Verbind naar een klas in HD

  • Klassikale training

    Klassikaal leren

  • Op locatie klant

    Op locatie klant

  • Virtueel leren

    Virtueel leren

Vraag deze training aan in een andere lesvorm.

Trainingsbeschrijving

Naar boven

200+ days. That’s the average amount of time that attackers reside within your network until they are detected, gathering classified data and information, waiting to strike at just the right moment. The Microsoft Advanced Threat Analytics (ATA) helps to identify breaches and threats using behavioral analysis and provides a clear, actionable report on a simple attack timeline. Customers that want to proactively monitor the environment should be more aware about which activities are malicious, which are good. This is a great challenge when this relates to the hundred-servers environment.

Doelgroep

Naar boven
Infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.

Trainingsdoelstellingen

Naar boven
  • Module 1: Threat landscape
  • Module 2: ATA Architecture
  • Module 3: Prerequisites
  • Module 4: Installation
  • Module 5: Detection module
  • Module 6: Analytics module
  • Module 7: Management
  • Module 8: Troubleshooting
  • Module 9: Further steps

Inhoud training

Naar boven

Module 1: Threat landscape

  • Risks for cloud and on-premise infrastructure
  • Modern threats
  • Incident response flaws

Module 2: ATA Architecture

  • ATA Center
  • ATA Gateway
  • ATA Console
  • Multi-segment networks

Module 3: Prerequisites

  • Active Directory requirements
  • Networking requirements
  • Database requirements
  • Capacity planning
  • Port and protocols

Module 4: Installation

  • Port monitoring
  • Event collection
  • Mobility support
  • Integration to SIEM/Syslog
  • Virtualization issues

Module 5: Detection module

  • Incident responding
  • Short-term lease subnets
  • Honeytokens

Module 6: Analytics module

  • Suspicious Activities Time Line
  • Filtering Suspicious Activities
  • Self-learning

Module 7: Management

  • ATA Console
  • ATA Configuration
  • Alerts
  • Health Center
  • Database management
  • Telemetry

Module 8: Troubleshooting

  • Backup and Restore
  • Logs
  • Performance counters
  • Database

Module 9: Further steps

  • Advanced monitoring techniques
  • Incident response plans

Voorkennis

Naar boven

An ideal candidate for this course should have attended Masterclass: Hacking and Securing Windows Infrastructure. You should alternatively have good knowledge on Windows authentication mechanisms and protocols. You should have good understanding of PTH and PTT attacks. Experience in Active Directory Domain Services is highly recommended.

Cookie Control toggle icon