Blog Post

Microsoft Security Experts Blog
12 MIN READ

Fuzzy hashing logs to find malicious activity

Steve_Versteeg's avatar
Apr 05, 2023
Introduction  During a forensic investigation, malicious activity may be discovered in logs. An incident responder may want to identify related malicious activity across a range of related log file...
Updated Apr 11, 2023
Version 4.0