threat hunting
226 TopicsAzure Sentinel To-Go (Part1): A Lab w/ Prerecorded Data 😈 & a Custom Logs Pipe via ARM Templates 🚀
In this post, I show you how to use ARM templates to deploy an Azure Sentinel solution and ingest pre-recorded datasets via a python script, Azure Event Hubs and a Logstash pipeline.68KViews20likes25CommentsWhat's new: Earn your Microsoft Sentinel Black Belt Digital Badge!
Our Cloud Security Private Community Digital Badge program has introduced a new L5 Microsoft Sentinel Black Belt Digital Badge for you to earn and display proudly to show your prowess as a Microsoft recognized expert.20KViews12likes10CommentsJoint forces - MS Sentinel and the MITRE framework
MITRE ATT&CK is a publicly accessible framework and knowledgebase of tactics and techniques that are commonly used by attackers. The MITRE ATT&CK framework is created and maintained by observing real-world scenarios. Many organizations use the MITRE ATT&CK framework to develop specific threat models and methodologies that are used to verify security status in their environments. In this blog post, we discuss the Microsoft Sentinel integration with the MITRE ATT&CK framework, and how it can help you improve your overall security coverage.14KViews9likes2CommentsSecurity Investigation with Azure Sentinel and Jupyter Notebooks – Part 1
This is first of a three-part series about using Jupyter notebooks in Azure Sentinel to trace the path of a security breach in a organization's network. It is accompanied by the notebook and Python code.29KViews8likes2Comments