Microsoft Sentinel - Tables
Introduction In a Microsoft Sentinel Log Analytics Workspace (LAW), a variety of tables are created to store logs, metrics, and other data collected from different sources Tables by Solutions ...
Introduction In a Microsoft Sentinel Log Analytics Workspace (LAW), a variety of tables are created to store logs, metrics, and other data collected from different sources Tables by Solutions ...
Introduction Playbooks in Microsoft Sentinel are automated workflows built using Azure Logic Apps that help orchestrate and automate responses to security threats. Playbooks enable security op...
Introduction Microsoft Sentinel Hunts, also known as “hunting queries,” refer to proactive search activities conducted by security analysts to identify potential threats or indicators of comprom...
Introduction Microsoft Sentinel offers a variety of connectors to integrate with different data sources, enabling comprehensive data collection and analysis across your enterprise environment. ...
Introduction Analytics in Microsoft Sentinel refers to the use of advanced analytics rules and machine learning models to detect threats and anomalous activities across your monitored environmen...
Categories Networking Azure Virtual Network Azure Load Balancer Azure Application Gateway Azure Traffic Manager Azure ...
Introduction The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a comprehensive and detailed matrix of tactics and techniques used by cyber adversaries thr...
Categories Networking Google Virtual Private Cloud (VPC) Google Cloud Load Balancing Google Cloud DNS Google Cloud CDN Google Cloud In...
Overview Security Defender for Cloud Recommendations Security Alerts Security Posture Regulatory Compliance Workload Protections ...
Categories Networking Amazon VPC Elastic Load Balancing AWS Direct Connect Amazon Route 53 AWS Transit Gateway AWS VPN ...