copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
Microsoft Graph activity logs is now generally available | Microsoft . . . We’re excited to announce the general availability of Microsoft Graph activity logs! Microsoft Graph activity logs give you visibility into HTTP requests made to the Microsoft Graph service in your tenant With rapidly growing security threats and an increasing number of attacks, this log data source allows you to perform security analysis, threat hunting, and monitor application activity in
Efficient Log Management with Microsoft Fabric A well-designed real-time intelligence solution for log file management using Microsoft Fabric and EventHouse can significantly enhance an organization’s ability to monitor, analyze, and respond to log events
Windows Events, how to collect them in Sentinel and which way is . . . The recommended path is to use the DCR built into Sentinel so that the Security logs are properly parsed Wrapping up: On this article we covered three options to collect Windows Events into a Log Analytics Workspace, what options are considered better for collecting Windows Security Events: Security Events via AMA and Windows Event Forwarder
Azure Monitor Logs Next Evolution: Multi-tier logging | Microsoft . . . Today we’re announcing the public preview of Auxiliary Logs, a new inexpensive Azure Monitor plan for verbose logs used in compliance and security scenarios Together with the recent public preview of Summary Rules and improved capabilities of Basic Logs, Azure Monitor Logs is evolving into a new multi-tier logging vision Most organizations have many different needs for logging This is
Creating Custom Intune Reports with Microsoft Graph API | Microsoft . . . The script provided creates all the required resources to create your own custom reports You can leverage the concepts used in this example to add additional data sources and expand your Log Analytics workbooks (by adding additional columns or tables) to store other data pulled from Microsoft Graph
Introducing the Microsoft Purview Audit Search Graph API Microsoft Graph offers a single endpoint to provide access to rich data and insights across the Microsoft ecosystem The Microsoft Audit Search Graph API is designed to provide a more efficient and reliable way to search audit logs, making it easier for customers and partners to monitor and investigate security incidents
Microsoft Sentinel Blog Microsoft Sentinel Blog Microsoft Sentinel is a cloud-native SIEM, enriched with AI and automation to provide expansive visibility across your digital environment When evaluating various solutions, your peers value hearing from people like you who’ve used the product Review Microsoft Sentinel by filling out a Gartner Peer Insights survey and receive a $25 USD gift card (for customers only
Auditing Admin activities in Microsoft Defender Endpoint | Microsoft . . . The Purview Audit logs are exposed in the Office Management Activity API and in some environments the Microsoft Graph providing organizations with a robust solution to extract audit log data from Microsoft 365 environments and integrate it seamlessly into third-party tools like Security Information and Event Management (SIEM) systems
Good UAL Hunting | Microsoft Community Hub Good UAL Hunting In our last blog on this series, Forensic artifacts in Office 365 and where to find them, we spoke about where data relating to Office 365 can be found and which endpoints can be used to effectively conduct a cybersecurity investigation In this blog post, we will be taking a deeper dive into one of those data sources, the Office 365 Unified Audit Log (UAL) This is a key data