August 18, 2021, 11:00 AM ET / 8:00 AM PT (webinar recording date)
Presenter: Sylvie Liu
Azure Sentinel leverages machine learning technology called Fusion to automatically detect multistage attacks by identifying combinations of anomalous behaviors and suspicious activities that are observed at various stages of the kill-chain. On the basis of these discoveries, Azure Sentinel generates incidents that would otherwise be difficult to catch. These incidents comprise two or more alerts or activities. By design, these incidents are low-volume, high-fidelity, and high-severity.
To help you discover threats and anomalous behaviors that are more tailored to your environment, Fusion can now detect 32 new multi-stage attack scenarios leveraging a set of scheduled analytics rules. In this webinar, we will walk you through how Fusion works with the scheduled analytics rules, how to create and configure the scheduled rules, and how to investigate incidents created by Fusion.
To ensure you hear about future Microsoft Sentinel webinars and other developments, make sure you join our community by going to [ Ссылка ]
Deck shared during the webinar can be accessed on [ Ссылка ]
below the recordings section. #MicrosoftSentinel
Ещё видео!