Blueprint: Build the Best in Cyber Defense cover image

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging

Blueprint: Build the Best in Cyber Defense

00:00

Introduction

On this episode of blueprint, we've got carissa copeman's and for the third time, returning guest, mark marzinski. And they're herd to tell us about something i'm guessing nearly everyone listening will be interested in, mikraso security operations guide. Did you know mikrosoft has released extensive documentation on what exactly we should be looking for to detect compromise in our azure environments? Yes, they have. In this episod, we're ging to talk about what is in that guide, the most important log sources for detecting azure compromise,. The easiest way to get those logs into your environment and turn them into actionable dashboards with things like pre

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app