Blueprint: Build the Best in Cyber Defense cover image

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging

Blueprint: Build the Best in Cyber Defense

00:00

Ajrite Security Operations Guide

i think one of the big things since the last time i was here with the i r play books, is we have a full blown ajrite security operations guide. But before we get into all those details, cause there's, oht in that. Ah, sexcre operations guyd you probably, we shold probably do a quick review of what the different log sources are in azurad. And if you have azure, or if you have office three 65, you have azradeven f, you don't know it yet. So, ah, ou mag, kind of run through. Thos, john, just come day, definit hevy gr it

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app