LEADER 04124nam 22005295 450 001 9911047705003321 005 20251120114903.0 010 $a979-88-6882-040-3 024 7 $a10.1007/979-8-8688-2040-3 035 $a(MiAaPQ)EBC32425693 035 $a(Au-PeEL)EBL32425693 035 $a(CKB)43658946500041 035 $a(CaSebORM)9798868820403 035 $a(OCoLC)1553230525 035 $a(OCoLC-P)1553230525 035 $a(DE-He213)979-8-8688-2040-3 035 $a(EXLCZ)9943658946500041 100 $a20251120d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDesign and Deploy Microsoft Azure Sentinel for IoMT $eEnhance IoMT Cybersecurity Operations with Intelligent Analytics /$fby Puthiyavan Udayakumar, Dr. R Anandan 205 $a1st ed. 2025. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2025. 215 $a1 online resource (337 pages) 225 1 $aProfessional and Applied Computing Series 311 08$a979-88-6882-039-7 327 $aChapter 1: Get Started with Microsoft Sentinel and IoMT -- Chapter 2: Architecting and Deploying Microsoft Sentinel -- Chapter 3: Engineering Microsoft Sentinel for Security Operations -- Chapter 4: Threat Detection, Investigation, and Response. 330 $aMicrosoft Sentinel for Internet of Medical Things (IoMT) provides advanced threat detection, investigation, and automated response for connected medical devices, guaranteeing real-time protection in healthcare environments. The book guides you to deploy, and optimize Microsoft Sentinel specifically for IoMT environments, guaranteeing the protection of critical medical systems and patient data. The book starts with introducing the fundamental concepts of Sentinel, its role in securing IoMT, and the latest advancements in healthcare cybersecurity. Architecting and Deploying Microsoft Sentinel focuses on designing a Sentinel workspace tailored for IoMT, integrating medical device logs, and applying Zero Trust principles to secure connected healthcare environments. Engineering Microsoft Sentinel for Security Operations explores how security engineers can configure analytics, automate threat response, and optimize Security Operations Center (SOC) workflows to mitigate IoMT-specific threats, such as ransomware attacks on medical devices or unauthorized access to patient records. Finally, Threat Detection, Investigation, and Response provides practical techniques for security analysts, including crafting detection rules for IoMT anomalies, investigating incidents involving medical devices, and leveraging Kusto Query Language (KQL) to proactively hunt for threats in healthcare networks. By the end of this book, you will be equipped to design, implement, and operate a comprehensive security framework for IoMT environments using Microsoft Sentinel. What You Will Learn: Design and deploy a Microsoft Sentinel workspace tailored specifically for IoMT, including integrating medical device logs. Implementing Zero Trust security principles to safeguard connected healthcare systems. Gain practical skills in creating custom detection rules for IoMT devices, investigating security incidents involving medical systems Understanding compliance with key healthcare regulations (such as HIPAA, GDPR, and FDA). 410 0$aProfessional and Applied Computing Series 606 $aInternet of things$xSecurity measures 606 $aMedical instruments and apparatus$xTechnological innovations$xSecurity measures 606 $aMicrosoft Azure (Computing platform) 615 0$aInternet of things$xSecurity measures. 615 0$aMedical instruments and apparatus$xTechnological innovations$xSecurity measures. 615 0$aMicrosoft Azure (Computing platform) 676 $a004.67/8 700 $aUdayakumar$b Puthiyavan$0940513 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911047705003321 996 $aDesign and Deploy Microsoft Azure Sentinel for IoMT$94467578 997 $aUNINA