New Blog Post | The Azure Sentinel Anomalies Simulator

Microsoft

AshleyMartin_0-1633027591188.png

Azure Sentinel Anomalies Simulator (microsoft.com)

We are pleased to announce the “Unusual Mass Downgrade AIP Label” anomaly simulator, the first in a series of simulators for Azure Sentinel Anomalies. This simulator will populate the table in Azure Sentinel monitored by the relevant anomaly rule with simulated data. This simulated data will trigger an anomaly. You can review the anomaly by querying the Anomalies table for the anomaly rule’s name. These simulators will enable users to validate that an anomaly rule works in their Sentinel workspace.

Original Post: New Blog Post | The Azure Sentinel Anomalies Simulator - Microsoft Tech Community

0 Replies