Tutorial – How to make data transformations using Data Collection Rules?
This section will show you the steps for setting up data transformations – and how you can do the transformation …
This section will show you the steps for setting up data transformations – and how you can do the transformation …
I am really passioned about the logging capabilities in M365 Defender and Azure with the power to bring data back from clients, servers, cloud and …
This blog covers 2 topics : (1) how you can automate clean-up of any orphaned security principal role assignments – …
Background Recently, I was asked to build a simple reporting-script, which integrates data from Microsoft Defender for Cloud and Azure …
This is a real-life example of how I helped reduce the log-cost by 43% for LogAnalytics & Sentinel combined for …
Microsoft’s Defender Vulnerability Management is a built-in module in Microsoft Defender for Endpoint that can: If you’ve enabled the integration with Microsoft …
Recently I was asked to provide a solution to detect file deletions on a file server in a sensitive folder …
One of the cool features in Azure LogAnalytics is the capability to do data-transformation before the data enters your LogAnalytics …