Recent Blog ArticlesMost RecentMost LikesMicrosoft Sentinel Blog - Table of Contents As Microsoft Sentinel Blogs grow in number, this Table of Contents will help you navigate the variety of topical areas. This includes articles on log management, da...Azure Sentinel: Performing Additional Security Monitoring of High-Value Accounts Most environments have high-value accounts and are often attacked. This post shows high-value account monitoring using Azure Sentinel. SolarWinds Post-Compromise Hunting with Azure Sentinel Microsoft recently blogged about the Recent Nation-State Cyber Attacks that has impacted high value targets both across the government and private sector. This attack is also known as Soloriga...Re: Azure Sentinel: Performing Additional Security Monitoring of High-Value Accounts Ciyaresh- Thanks for the question. I probably need a bit more information, but let me see if I can help first. You can create a list from any table source using this type of method and then simply...Re: SolarWinds Post-Compromise Hunting with Azure Sentinel mrman5917- Apologies, that was a typo in this section and the evaluate has been removed - "Additionally, below is a sample query that brings out some of the logons to Azure AD where multi factor aut...Identifying Threat Hunting opportunities in your data Azure Sentinel allows for a very nice investigation experience when pivoting on interesting entities that are brought to you via Analytics and Hunting queries. Threat Hunters also review security bl...