Blueprint: Build the Best in Cyber Defense cover image

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging

Blueprint: Build the Best in Cyber Defense

00:00

How Do I Get Those Logs Into My Event Tub?

The security operations guide focuses on what you should be monitoring from a sock perspective. It gives you the log sources that like, this is the thing, how you look for it. And then we kind of give you a high, medium or low based on what we thought is the most important things that the sock should be looking for. Now, the question iagain wi ask you, john, i talked about this before. How do you get those logs into your seam? What is the recommended way?

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app