Latest Blog Articles
8 MIN READ
Bicep is becoming a popular way of deploying Microsoft Sentinel. This article will show how this can be done as well as deploying solutions from the Content Hub and Analytic Rules.
Oct 24, 20244.8KViews
3likes
1Comment
Learn how to reduce your data volume while also collecting the information with the highest security/detective value to your org.
Oct 15, 20244.6KViews
1like
0Comments
Several Sentinel users raised the alarm that several of the data connectors they were using suddenly show as deprecated in the user interface.
Oct 15, 20242.1KViews
0likes
2Comments
Honeypot:
Honeypot is a security mechanism designed to attract, detect, and analyze malicious activities and attackers by simulating a vulnerable system or network service. The primary purpose of a...
Oct 04, 20248.2KViews
0likes
1Comment
1. Intro While looking for the most effective use cases for Sentinel, it usually makes sense to start with data sources that already exist in some way in the corporate environment, whether due to a ...
Oct 04, 20243.5KViews
0likes
0Comments
If you’ve explored our Microsoft Sentinel Ninja Training in the past, it’s time to revisit!
Our training program has undergone some exciting changes to keep you ahead of the curve in the ever-evolv...
Oct 02, 20244.1KViews
4likes
1Comment
3 MIN READ
We are thrilled to announce a significant enhancement to our Unified Security Operations (SecOps) platform. The Global Search feature in the Defender XDR portal now supports searching for Microsoft S...
Sep 25, 20242.3KViews
0likes
1Comment
7 MIN READ
We would like to provide new update on AiTM (Adversary-in-the-Middle) phishing attacks hunting query with the Unified Security Operations Platform. These queries are revised versions from the blog po...
Sep 23, 20245KViews
4likes
0Comments
6 MIN READ
Although Defender for Endpoint (MDE) consists of various protections against tampering and of alerts to detect it, adversaries are constantly trying to find a way to successfully circumvent and termi...
Sep 23, 20242.6KViews
2likes
0Comments
PowerShell is a great tool for administrators to manage devices and servers in their environment. When using it to administer remote systems with PSRemoting, you don’t leave credentials behind on the...
Sep 16, 20246.3KViews
3likes
5Comments
Resources
Share
Tags
- Microsoft Sentinel182 Topics
- security96 Topics
- Investigation95 Topics
- Detection82 Topics
- what's new70 Topics
- SIEM68 Topics
- Hunting65 Topics
- SOAR40 Topics
- Threat Hunting33 Topics
- Solutions31 Topics