
The hidden danger of device code phishing
Currently there is a peak in abuse of device codes which are gathered by phishing attempts
Currently there is a peak in abuse of device codes which are gathered by phishing attempts
Use the Microsoft XDR optimization feature to improve a unified SIEM and XDR environment
Microsoft has added the Microsoft Sentinel Workbooks to the XDR portal
Today we will create our detection rules and make them available in Azure Devops
We will use a script I recently created to generate a set of analytic rules, ready to be used in Microsoft Sentinel.
Manage permissions for Microsoft Sentinel across Multiple Environments with Lighthouse
Start use Azure Sentinel for your organization.
Once we start defending our environments, what is there to lookout for outside your Microsoft environment?
The first bits of Infrastructure as Code in Azure to deploy your first resources!
Introduction Recently I started with Kusto Query Language (KQL) to explore the possibility of making lots of data useful or search for specific answers within an environment which contains lots of...