Blueprint: Build the Best in Cyber Defense cover image

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging

Blueprint: Build the Best in Cyber Defense

00:00

The Different Log Sources

Soversion, i'm now, i'm the host. How many? How many? Aleme, let me run through them. I think this will help kind to set up the what the diferent log sources are and things that youre younow everyone should be taken a look at. For any enterprise of really any kind of size, especially for the extra large ones, though, we're going to get aflood of data. And that's where that security operations guide steps in and points to a lot of that really fantastic stuff.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app