Training Micro Focus

Training goals dlearning

code: SEN250-80 | version: 8

This course teaches you how to implement and use Sentinel 8. You will learn how to manage data including scalable storage, create active views, search for and review events, correlate events, create actions, and manage incidents. 

The hands-on labs for this course use version 8 of the software.

Upon successful completion of this course, you should be able to:

  • Understand the dataflow of Sentinel
  • Discuss the different installation types
  • Define the several different types of use cases
  • List the new features of version 8.0
  • Discuss the latest license agreement type
  • List the data sources and data flow
  • Discuss factors of Sentinel sizing related to various networks
  • Create active views and apply filters in the control center
  • Understand the parameters of active views
  • Create event views and apply filters in the web UI
  • Create Users and Roles
  • Set LDAP Settings
  • Define Security
  • Setup Active User Sessions
  • Discuss Internal Data Stores
  • Define Data Retention
  • Discuss Remote Storage
  • Use the Event Source Management (ESM) user interface
  • Create an event source
  • Perform a Running Search
  • Define a Search Filters
  • Define Report Definitions
  • Perform a Distributed Search
  • Discuss White Label Template
  • Create active views and apply filters in the control center
  • Understand the parameters of active views
  • Create event views and apply filters in the web UI
  • Understand the parameters of event views
  • Discuss Correlated Event Output
  • Discuss Correlation Wizard
  • Define Correlation Logic
  • Define Creating Correlations
  • List Constructs and Operators
  • Creating Actions
  • Adding an Action to a correlation
  • Discuss Action panels
  • Define Action Execution Criteria
  • Understand Incident Management
  • Create a new incident
  • Review new incidence
  • Discuss iTRAC
  • Define Process and Work Management
  • List the ITRAC life cycle (steps and transitions)
  • Define Role Management
  • Discuss the differences between a Managed and a Unmanaged Windows Agent
  • Define Central Computer and Discovery rules
  • Discuss the Windows Agent Administrator (Wizard)
  • Define Data Mapping
  • Describe how to Add a Map
  • Discuss Meta-tag References
  • Perform an Anomaly Setup
  • Define Alerts
  • Discuss Role-based Access Control (RBAC)
  • Define Alert Creation
  • Discuss Real-time Alert Views
  • Define Alert Dashboards
  • Define NetFlow
  • Discuss NetFlow User Proxy
  • Install the NetFlow Collector
  • Discuss Trend Analysis
  • Create a Baseline
  • Determine Anomaly Detection

Audience/Job Roles

The course is designed for Sentinel administrators and support personnel familiar with Windows, Domain Controllers, and Networking.

Conspect Show list

  1. What is Sentinel?
    • Architecture
    • Markets
    • Sentinel Log Manager
    • Security Event and Incident Management
    • Use Cases
    • Sentinel 8.0 Updates
    • Licensing Updates
  2. Planning
    • Data Sources and Flow
    • High Availability
    • Sizing
  3. Installation
    • Installation Options
    • Open Virtualization Format (OVF) and Appliance Updates
    • Installation
  4. Event Views
    • Active Views
    • Event Views
  5. Setting Up Users
    • Configuring LDAP
    • Configuring User Security
    • Configuring Password Complexity
    • Viewing Active User Sessions
    • Setting Up Users
  6. Storage
    • Internal Data Stores
    • Data Retention
    • Remote Configuration
  7. Event Collection
    • Event Source Management (ESM) Interface
    • ESM Components
    • Creating an Event Source
  8. Searching and Reporting
    • Running a Search
    • Search Filters
    • Running a Report
    • Scheduling a Report
    • Report Definitions
    • Distributed Search
    • White Label Template
  9. Multitenancy
    • Managed Security Service Providers
    • Multitenancy
    • MSSP Enhancements
    • Tenant
  10. Correlation
    • Correlated Event Output
    • Creating Correlations
    • Constructs
  11. Taking Action on Events
    • Creating Actions
    • Taking Action
    • Actions Panel
  12. Incident Response
    • Itrac
    • Process Management
  13. Sentinel Agent Manager (SAM)
    • Windows Agent
    • Central Computers & Discovery Rules
    • Windows Agent Administrator
  14. Adding Event Context
    • Discuss Event Context
  15. Security Intelligence
    • Trend Analysis Baseline
    • Anomaly Detection
    • Security Intelligence
  16. Alerts
    • Alerts
    • Alert Dashboards
    • Investigating Alerts
  17. NetFlow
    • NetFlow
    • Real-Time Monitoring
    • Moving Updates
  18. Anomaly Setup
    • Discuss Anomaly Setup
  19. Scalable Storage
    • High Level Design
    • Installation and Configuration
    • Sentinel Scalable Data Manager
    • Role Based Access Control
    • Event visualization
    • Sizing and Hardware Recommendations
Download conspect training as PDF

Additional information


To be successful in this course, you should have the following prerequisites or knowledge:

  • Windows
  • Networking
  • Active Directory
Difficulty level
Duration 4 days

The participants will obtain certificates signed by Micro Focus (course completion).


Authorized Micro Focus Trainer.

Micro Focus show more courses
Training thematically related

IT Security

Contact form

Please fill form below to obtain more info about this training.

* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

2880 USD


Discount codes

Discount code may refer to (training, producer, deadline). If you have a discount code, enter it in the appropriate field.
(green means entering the correct code | red means the code is incorrect)



Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit site



Electronic materials

Electronic Materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.



No deadlines for this training.

Suggest your own appointment