Recent Blog ArticlesMost RecentMost LikesEnrich your advanced hunting experience using network layer signals from Zeek Expand your investigation, hunting, and detection capabilities using avariety of Zeek-based events in advanced hunting. Hunting for network signatures in Microsoft Defender for Endpoint Read this blog post to discover Microsoft Defender for Endpoint new capability on capturing and analyzingNetwork traffic. Re: Respond to threats in near real-time with custom detections P4tr8kit is likely that your rule query does not meet the critera for enabling that rule to Near Realtime. Take a look at the documentation where you can see what are the criteria for assigning a ru...Re: How to use tagging effectively (Part 2) HiEltonSancho, A device is automatically tagged as inactive according to specific conditions described here. Do you have another use case for marking a device as inactive ?