Тёмный
No video :(

Microsoft Sentinel Best Practice for Admin Users 

CraigCloudITPro
Подписаться 1,3 тыс.
Просмотров 1,5 тыс.
50% 1

Microsoft Sentinel - Best Practice for Admin Users
--------------------------------------------------------------------------------------------------
🔔 Subscribe and ring the bell to get notified when I post a video!
🔴 Check out my blog 🔴
craigclouditpr...
🔥Social Media's 🔥
🐥 Twitter: / craigclouditpro
📸 Instagram: / craigclouditpro
📩 LinkedIn: / craig-fretwell
🎵Outro music on the video by Spojaz
Azure Sentinel, threat intelligence, ASIM, Azure Information model query parsing, mastering analytics,hunting, azure sentinel hunting, detection, hacking, azure analytic rules, lolbas, binaries and scripts detections, threat hunting malware, security hacking, azure sentinel hacking, blue team azure sentinel, red team sentinel, analytics, splunk, use cases, detection rule creation, azure security mappings, azure security center, misconfigurations, asc, defender, threathunting, deep dive analysis, powershell exploit microsoft sentinel, azure platform threats,

Опубликовано:

 

15 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 3   
@JackSmith-oy7rx
@JackSmith-oy7rx 2 года назад
at 16.59 for the log analytics query logs table, do you mean the Activity log for the LA resource?
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Hey Jack, so the LA query logs table is for SOC users that are running queries inside the specified Log Analytics Workspace
@CraigCloudITPro
@CraigCloudITPro 2 года назад
You can audit activities with Azure Activity of course, but the LA query logs is specified at which table and queries were ran, I hope that helps :)
Далее
Microsoft Sentinel Threat Hunting Deep Dive
24:03
Просмотров 5 тыс.
НАША НАСЫЩЕННАЯ ПОЕЗДКА В КИТАЙ
1:32:55
до/после Знакомо?
00:16
Просмотров 13 тыс.
Incident Response Procedures with Microsoft Sentinel
15:26
CoPilot for Microsoft 365 Security Risks
19:51
Просмотров 1 тыс.
Understanding Active Directory and Group Policy
51:56