0
AzureTracks.com - Microsoft Sentinel data retention basics - superhero of data retention pictured center with a shield and red cape.

Building a Microsoft Sentinel Data Use Case

Join me this week to gain an in-depth understanding on how to clearly define what data to retain. Data retention is not just a regulatory box to tick; it’s the backbone of a robust security posture.  In the realm of Microsoft Sentinel, understanding how to manage your data retention is key to leveraging the full potential of your SIEM system.  From cost management to compliance, the way you handle data can make or break your security operations.

Posted on 8:40 am
0
AzureTracks.com - where to start with data retention - shown is a stack of servers that may store data.

Data Retention in Sentinel – Where to Start

Join me for as we explore one of the critical aspects of using Microsoft Sentinel — understanding data retention and how to get started.  Data retention in Microsoft Sentinel involves managing how long data is kept within your Log Analytics workspace.  This is crucial for compliance, incident response, log searchability, and cost management.

Posted on 7:10 am
0
AzureTracks.com - 100th Updates Post - Azure news, blog, help, security and infrastructure updates about Azure.

Azure Updates – Number 100 – October 19, 2024

I am thrilled to announce to have reached a significant milestone – our 100th Azure Updates blog post!
Over the past few years, we’ve shared countless updates, tips, and insights to help you make the most of Azure’s ever-evolving ecosystem.
A summary update on Azure news that includes updates released from Microsoft Azure related to Azure, Architecture, Compute, Security Copilot and Sentinel topics. Save time digging around to find recent releases and changes.

Posted on 9:05 am

Using Threat Intelligence in Microsoft Sentinel to Enhance Incidents

In this article, we explore real world automation and improvements to Sentinel Incidents. Leveraging Microsoft Sentinel Playbooks you can streamline your SOC security operations and respond to incidents faster and with the information your Analysts need to make decisions. A key component of this process is the integration of Threat Intelligence (TI) to enrich incident data with critical context – before anyone opens that incident to investigate.

Posted on 7:07 am
0
AzureTracks.com explores using KQL to get started with threat hunting in Microsoft Sentinel. Pictured is the AI version of our Belgian Mia with some wires in her mouth while hunting for threats.

How do I Start Threat Hunting with Microsoft Sentinel?

Join me as I explore getting started with threat hunting using Microsoft Sentinel and KQL to jump-start our investigations. We will dive into a world where we look for anomalies in the data and try to identify potential threats before they can escalate within our environment.

Posted on 6:55 am