azure 7
- Seeding a Sentinel PoC Workspace with Dummy Security Logs
- Defender for Cloud - Managing Recommendation Owners at Scale
- Konnectivity Evolution - From Tunnels to VNet Integration
- Ingestion into Sentinel via Event Hub made simple
- Retrieve Azure VM Run Commands through Defender AH tables (PoC)
- VNet Flow Logs - Detection of Malicious Outbound Connections with DNS Mapping
- Detect suspicious DNS requests using Azure DNS Security Policy and Sentinel Summary Rules