Azure Sentinel
Copied!
Home
Options
1,433
Ofer_Shezaf on 10-16-2019 11:15 PM
1,759
shainw on 10-15-2019 08:56 AM
1,629
Pete Bryan on 10-07-2019 10:00 AM
1,435
ianhelle on 09-30-2019 08:27 AM
3,141
Ofer_Shezaf on 09-24-2019 11:30 PM
1,535
Ofer_Shezaf on 09-19-2019 02:11 PM
2,013
Ofer_Shezaf on 09-18-2019 02:00 AM
9,570
Tiander Turpijn on 08-31-2019 02:58 PM
2,332
Ofer_Shezaf on 08-19-2019 01:43 PM
1,800
Ofer_Shezaf on 08-13-2019 11:53 PM
1,591
Ofer_Shezaf on 08-07-2019 02:30 AM
3,860
Ashwin_Patil on 07-31-2019 07:45 AM
1,594
Ofer_Shezaf on 07-22-2019 05:15 PM
2,071
Pete Bryan on 06-25-2019 08:27 AM
3,150
ianhelle on 06-17-2019 08:27 AM
3,120
Ashwin_Patil on 06-10-2019 07:44 AM
3,367
ianhelle on 06-05-2019 05:02 PM
2,554
Ashwin_Patil on 05-15-2019 07:00 AM
2,826
ianhelle on 05-13-2019 06:32 AM
2,368
Tim Burrell (MSTIC) on 05-01-2019 08:34 AM
3,318
ianhelle on 04-25-2019 05:11 PM
2,270
ianhelle on 04-22-2019 08:27 AM
7,297
ianhelle on 04-16-2019 08:22 AM
4,968
shainw on 04-11-2019 09:00 AM
Latest Comments
Great post Mr Bryan. Looking forward to future posts on how organisations can leverage Microsoft Security Graph to aid threat hunting and breach investigations. Keep up the good work!
1 Likes
Is there any collateral available to support customer sizing and pricing for a Sentinel deployment ? Pre-Sentinel days, SIEM consumers were accustomed to pricing which was driven by messages/events/GB per day. This stat was underpinned by understanding log sources and equating an average message siz...
0 Likes
Great news!  /Mattias
2 Likes
Great that the dashboards are replaced by the workbooks! Provides more flexibility. I Did some trial deployments for the customers as well as courses. Luckily didn't deep dive into the Dashboards. Couple of questions: 1. Will the investigation be part of the GA as it just was in a private preview?2....
0 Likes
Nice article. It's focused on IAAS, I miss other workloads e.g. the Office 365 audit logs or the Dynamics 365 logs, etc. The Office 365 audit logs can be integrated with LA and Sentinel. These logs contain possible PII and sensitive data, which some people e.g. the SOC should not be able to see. The...
0 Likes