Dipping your toes in Microsoft Sentinel Automation
Join us as we dip our toes into Microsoft Sentinel Automation, explaining common automation use cases and how to utilize Playbooks.
Join us as we dip our toes into Microsoft Sentinel Automation, explaining common automation use cases and how to utilize Playbooks.
This article deep dives into two different methods of adding and ingesting Active Directory Logs to Microsoft Sentinel.
In this article, Thijs Lecomte outlines how to prioritize data connectors in Microsoft Sentinel while keeping costs down.
This article continues the discussion of the main steps needed to mitigate a zero-day threat Using Microsoft 365 Defender and Sentinel.
In this article, Thijs Lecomte walks through various protection and detection mechanisms available to repel password spray attacks.
This article discusses the four main steps to mitigate a zero-day threat Using Microsoft 365 Defender and Sentinel.
This article is intended to help newcomers to get started with KQL by explaining what it is and how to use it in Microsoft Sentinel.
When you deploy Microsoft Sentinel, one of the most important design decisions is determining the appropriate data retention period.
Microsoft Jutannounced two new products in the Microsoft cloud Security stack. Both products were acquired from reputable tech companies.
Managing inactive devices is a confusing concept for an administrator just starting with Microsoft Defender for Endpoint. This article will provide key insights on how organizations can handle inactive devices within Microsoft Defender for Endpoint.
Microsoft Defender for Endpoint is not a product you roll out and forget. To get the most out of this tool on a day-to-day basis, we walk through some actions administrators should be doing to keep current with the product.
Determine if Azure AD security defaults are right for your organization or if you should turn them off.