Microsoft Sentinel – Ingesting Intune Logs
This post details the configuration steps for ingesting Intune logs in Microsoft Sentinel and looks at some of the use cases for doing so.
The Technical Brain Dump of Cyber Security
This post details the configuration steps for ingesting Intune logs in Microsoft Sentinel and looks at some of the use cases for doing so.
This post looks to detail how to optimise costs with Microsoft Sentinel by using Commitment Tiers & Pre-Purchase Plans.
This article provides a quick start guide on using Microsoft Sentinel with Microsoft365, and focuses on a data connectors & analytical rules.
This post looks at automation examples in Microsoft Sentinel to showcase some key use cases for automating tasks.
This post details a few options for migrating Microsoft Sentinel between Azure subscriptions and resource groups.
This article provides the steps taken to implement Azure Lighthouse for multi-tenant management of Microsoft Sentinel instances.
This post details troubleshooting steps to take when Windows event logs are not being ingested into Microsoft Sentinel via Azure Arc VMs.
This post outlines the steps to ingest on-premises Windows event logs into Azure Sentinel using Azure Arc.
Ingesting Windows Server event logs into Microsoft Sentinel involves creating a Data Collection Rule for Azure VMs. Subsequent articles will cover on-premises methods.
Want more reporting in Microsoft Sentinel? Look no further, this guide will show you the steps to use PowerBI with Microsoft Sentinel.