wwlpublish Threat hunting with Microsoft Sentinel - Training
- In this module, you'll learn to use Microsoft
Sentinel queriestoproactivelyidentify threats,savekey findings withbookmarks, and monitor threats over time using livestream.
‣
Introduction
‣
Exercise setup
‣
Explore creation and management of threat-hunting queries
‣
Save key findings with bookmarks
‣
Observe threats over time with livestream
‣
Exercise - Hunt for threats by using Microsoft Sentinel
‣