wwlpublish Threat hunting with Microsoft Sentinel - Training
- In this module, you'll learn to use Microsoft
Sentinel queries
toproactively
identify threats,save
key findings withbookmarks
, and monitor threats over time using livestream.
‣
Introduction
‣
Exercise setup
‣
Explore creation and management of threat-hunting queries
‣
Save key findings with bookmarks
‣
Observe threats over time with livestream
‣
Exercise - Hunt for threats by using Microsoft Sentinel
‣