sentinel
2 TopicsAutomating Sentinel Triage with Microsoft Security Copilot
Automating Sentinel Triage with Microsoft Security Copilot ๐ค๐ง ๐ก๏ธ Weโre diving deep into the transformative world of AI-driven automation in cybersecurity. This session will explore how Microsoft Security Copilot, integrated with Logic Apps, can supercharge the triage process in Microsoft Sentinel. ๐ก What youโll take away: โ๏ธ Practical applications of AI in triage and incident response โ๏ธ How to reduce manual effort and operational costs โ๏ธ Innovative strategies to elevate efficiency in your SOC Join us as we explore how cutting-edge AI reshapes security operations and empowers teams to focus on what matters most. ๐๏ธ Date: 29 September 2025 โฐ Time: 17:00 (AEST) ๐๏ธ Speaker: Anthony Porter ๐ Topic: Automating Sentinel Triage with Microsoft Security Copilot22Views0likes0CommentsLog data for connecting and disconnecting Sentinel Data Connectors
Just wondering if anyone has any knowledge of where log data for connecting and disconnecting Sentinel Data connectors might be stored. We ran into this scenario in my production environment where the Azure Active Directory connectors for AuditLogs and SigninLogs were suddenly disconnected and no one has any record of when or why. I've since turned the connectors back on but I can't isolate the event or actor where the log was turned off. Has anyone had any experience with this, or could point me to a doc where I might generate a query to find this event? I can see roughly when the logs were turned off, and they were off for over a week.Solved2.4KViews1like1Comment