azure 5
- Konnectivity Evolution - From Tunnels to VNet Integration
- Ingestion into Sentinel via Event Hub made simple
- Retrieve Azure VM Run Commands through Defender AH tables (PoC)
- VNet Flow Logs - Detection of Malicious Outbound Connections with DNS Mapping
- Detect suspicious DNS requests using Azure DNS Security Policy and Sentinel Summary Rules