SecByte
Menu
Close
Start Sentinel Training
Training & Consultancy
YouTube
Search
Tag:
Cloud Security
Mar 9, 2025
↗
Step-by-Step Guide to Azure Custom Logs via AMA
Dec 6, 2024
↗
Automate Data Collection Rule and Virtual Machine Association Using PowerShell in Microsoft Sentinel
Sep 16, 2024
↗
Log Source Availability Monitoring with KQL in Microsoft Sentinel: An Essential Query for SOC Teams
Aug 27, 2024
↗
Suppressing Defender for XDR Incidents Using Automation Rules in Microsoft Sentinel: A Step-by-Step Guide
Aug 18, 2024
↗
Mastering Sentinel: The Essential KQL Query for Every SOC Team
Jun 6, 2024
↗
Troubleshoot Log Ingestion Drops to Microsoft Sentinel from Linux Machines: Addressing /var/log Capacity Issues
May 24, 2024
↗
Why Incident Counts Differ in Microsoft Sentinel: Portal vs. SecurityIncident Table
Apr 25, 2024
↗
Analyzing Authentication Methods in Azure: Insights from Azure Active Directory Audit Logs
Mar 4, 2024
↗
Configure to export data from Azure sentinel to Azure storage account
Feb 26, 2024
↗
Connect on-premises servers to Microsoft Sentinel using Azure Arc
Feb 12, 2024
↗
Log Trimming via Ingestion time transformation in Microsoft Sentinel
Feb 1, 2024
↗
Troubleshooting Guide: Syslog Forwarding into Microsoft Sentinel
Jan 27, 2024
↗
Simplifying Syslog Forwarding to Microsoft Sentinel: A User-Friendly Guide
Jan 27, 2024
↗
Unleashing the Power of Azure Sentinel: A Deep Dive into Its Unique Capabilities
Subscribe
Subscribed
SecByte
Sign me up
Already have a WordPress.com account?
Log in now.
SecByte
Subscribe
Subscribed
Sign up
Log in
Report this content
View site in Reader
Manage subscriptions
Collapse this bar