best practices
16 TopicsA Look at Different Options for Storing and Searching Sentinel Archived Logs
As an Azure Sentinel user, you know the importance of having a secure and accessible backup of your log data. In this blog, we'll show you the various options available for storing and searching Sentinel logs beyond the default 90-day retention period. Explore the features and benefits of each solution to find the best fit for your organization.21KViews6likes2CommentsCommon scenarios using Watchlists (with query examples)!
Watchlists in Microsoft Sentinel allow you to correlate data with events in your Microsoft Sentinel environment. Watchlists can be used for searching, detection rules, threat hunting, and in response playbooks. This blog highlights the 4 common Use-cases for watchlists then goes on to describe sample scenarios associated with each.20KViews4likes0CommentsAutomate tasks management to protect your organization against threats
Automate tasks management with new playbooks to better triage and investigate phishing, BEC and ransomware attacks and a new Workbook for managing tasks in the SOC, querying the new tasks fields in SecurityIncident table.13KViews4likes0Comments