Home

Using Azure Sentinel to supercharge your threat hunting

%3CLINGO-SUB%20id%3D%22lingo-sub-865473%22%20slang%3D%22en-US%22%3EUsing%20Azure%20Sentinel%20to%20supercharge%20your%20threat%20hunting%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-865473%22%20slang%3D%22en-US%22%3EAzure%20Sentinel%20provides%20a%20cloud%20based%20SIEM%20and%20SOAR%20platform%20that%20is%20ideal%20for%20detecting%2C%20investigating%2C%20and%20responding%20to%20threats%20in%20your%20environment.%20However%20how%20can%20you%20leverage%20the%20capabilities%20of%20Azure%20Sentinel%20to%20find%20those%20threats%20that%20you%20don%E2%80%99t%20currently%20know%20about%3F%20Hear%20from%20Microsoft%20security%20analysts%20about%20the%20best%20techniques%20and%20practices%20for%20threat%20hunting%20and%20how%20to%20supercharge%20them%20using%20the%20power%20of%20Kusto%20Query%20Language%2C%20Sentinel%E2%80%99s%20Graph%20Explorer%2C%20and%20Azure%20Notebooks%20in%20Azure%20Sentinel.%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-865473%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ETHR2174%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Highlighted
Community Manager
Azure Sentinel provides a cloud based SIEM and SOAR platform that is ideal for detecting, investigating, and responding to threats in your environment. However how can you leverage the capabilities of Azure Sentinel to find those threats that you don’t currently know about? Hear from Microsoft security analysts about the best techniques and practices for threat hunting and how to supercharge them using the power of Kusto Query Language, Sentinel’s Graph Explorer, and Azure Notebooks in Azure Sentinel.

View this session in the session catalog

View session