Introduction
During a forensic investigation, malicious activity may be discovered in logs. An incident responder may want to identify related malicious activity across a range of related log file...
Updated Apr 11, 2023
Version 4.0Steve_Versteeg
Microsoft
Joined March 31, 2023
Microsoft Security Experts Blog
Follow this blog board to get notified when there's new activity