episode 9: adding risky service principal logs to microsoft sentinel
Published 2 years ago • 363 plays • Length 1:15Download video MP4
Download video MP3
Similar videos
-
0:42
episode 1: keeping your microsoft sentinel solutions updated
-
1:20
episode 13: the archiving, basic logs, and retention workbook for microsoft sentinel
-
1:16
episode 5: how to quickly tell which microsoft sentinel tables are configured as basic logs
-
11:18
episode 014 - azuread application authentication support
-
1:00:38
episode 9: a closer look at singapore
-
12:30
ms-500 exam ep 09: manage synchronized identities
-
0:37
how to detect and mitigate login attempts using legacy auth with microsoft sentinel
-
6:49
pancast episode 22: azure container registry and configuring scanning using service principal
-
0:56
how to detect and mitigate quishing attacks with microsoft sentinel
-
0:31
how to detect and mitigate session token stealing attacks with microsoft sentinel
-
0:34
how to detect and mitigate zero-day exploits with microsoft sentinel
-
1:02
how to detect and mitigate drive-by download attacks with microsoft sentinel
-
1:07:15
centralizing cloud logs and events with microsoft sentinel
-
14:34
episode 2: azure openai content filtering and abuse monitoring with microsoft sentinel
-
59:15
063: azure sentinel information model with rod trent
-
26:49
new soar and incident management features | microsoft sentinel in the field #9
-
28:01
modernize security for efficiency & scale using azure sentinel from microsoft
-
0:33
how to be notified when microsoft sentinel data stops populating