Microsoft Sentinel – Ingesting Windows Server Event Logs from Azure VMs
Ingesting Windows Server event logs into Microsoft Sentinel involves creating a Data Collection Rule for Azure VMs. Subsequent articles will cover on-premises methods.
Ingesting Windows Server event logs into Microsoft Sentinel involves creating a Data Collection Rule for Azure VMs. Subsequent articles will cover on-premises methods.
A quick workaround for RDP login issues with Entra ID credentials on a Windows 11 VM in Azure.
There are many things to consider when implementing Microsoft Sentinel, such as: defining objectives, assessing environments, designing architecture, managing user access, and ensuring continuous improvement.
Whats happening in the market so far in regards to SIEM? How has XDR, Zero Trust and AI impacted the SIEM Market?
Having issues with expired certificates with Azure Arc enabled machines? This guide will give you the quick fix to reenabling Azure Arc.
SIEM technology began in the 1990s to centralise logs, evolved to real-time event analysis, and now uses machine learning for proactive threat detection.
Quick guide on discovering and controlling your users from using their account as a guest account on another tenant.
This article looks to simplify the methods of device management with AD and Azure AD.
Article on what iOS Supervised Mode is and the ways we can configure it.
An introduction to Single Sign-On, SAML and MFA.