Detect threats using GraphAPIAuditEvents - Part 3

For a long time now, defenders had the ability to monitor behavior of human- and workload identities in Entra tenants not only through AuditLogs but with high level of insight with the MicrosoftGraphActivityLogs logs. The last two articles of this series gave you detection ideas and hunting queries for this logs source and were meant as a kick starter for detection engineers. But in the end the high cost of this log prevented many companies from putting it into operation.

原始链接: https://cloudbrothers.info/detect-threats-graphapiauditevents-part-3/
侵权请联系站方: [email protected]

相关推荐

换一批