"templateRelativePath": "Fortigate.json ", \nEasily detect attacks on your organization by monitoring management operations such as configuration and logins. \nYou can learn about trends across user and data traffic, and drill down into the Fortigate filter results. \nThis workbook finds correlations in Fortigate threat events and identifies suspicious ports, users, protocols and IP addresses. "description": "Gain insights into Fortigate firewalls by analyzing traffic and activities. "templateRelativePath": "esetSMCWorkbook.json ", "title": "Eset Security Management Center Overview ", "description": "Visualize events and threats from Eset Security Management Center. "templateRelativePath": "PaloAltoNetworkThreat.json ", \nThis workbook makes it easy to track malware, vulnerability, and virus log events. \nYou can extract meaningful security information by correlating data between threats, applications, and time. "description": "Gain insights into Palo Alto network activities by analyzing threat events. "workbookKey": "PaloAltoNetworkThreatWorkbook ", "templateRelativePath": "PaloAltoOverview.json ", \nYou can learn about trends across user and data traffic, and drill down into Palo Alto Wildfire and filter results. \nThis workbook correlates all Palo Alto data with threat events to identify suspicious entities and relationships. "description": "Gain insights and comprehensive monitoring into Palo Alto firewalls by analyzing traffic and activities. "workbookKey": "PaloAltoOverviewWorkbook ", "templateRelativePath": "ExchangeOnline.json ", \nThis workbook let you monitor user activities, including logins, account operations, permission changes, and mailbox creations to discover suspicious trends among them. "description": "Gain insights into Microsoft Exchange online by tracing and analyzing all Exchange operations and user activities. "workbookKey": "ExchangeOnlineWorkbook ", \nEasily detect attacks on your organization by monitoring management operations, such as configuration and logins. \nYou can learn about trends across user and data traffic directions, and drill down into the Cisco filter results. \nThis workbook analyzes Cisco ASA threat events and identifies suspicious ports, users, protocols and IP addresses. "description": "Gain insights into your Cisco ASA firewalls by analyzing traffic, events, and firewall operations. "templateRelativePath": "CheckPoint.json ", "title": "Check Point Software Technologies ", "description": "Gain insights into Check Point network activities, including number of gateways and servers, security incidents, and identify infected hosts. "templateRelativePath": "ConditionalAccessTrendsandChanges.json ", "title": "Conditional Access Trends and Changes ", "description": "Gain insights into Conditional Access Trends and Changes. "workbookKey": "ConditionalAccessTrendsandChangesWorkbook ", "templateRelativePath": "IdentityAndAccess.json ", This workbook also identifies suspicious entities from login and access events. \nYou can view anomalies and trends across login events from all users and machines. "description": "Gain insights into Identity and access operations by collecting and analyzing security logs, using the audit and sign-in logs to gather insights into use of Microsoft products. "workbookKey": "IdentityAndAccessWorkbook ", "templateRelativePath": "AzureActivity.json ", \nThis workbook gives you the ability to drill down into caller activities and summarize detected failure and warning events. \nYou can learn about all user operations, trends, and anomalous changes over time. "description": "Gain extensive insight into your organization's Azure Activity by analyzing, and correlating all user operations and events. "logoFileName": "azureactivity_logo.svg ", "templateRelativePath": "ForcepointNGFWAdvanced.json ", "title": "Forcepoint Next Generation Firewall (NGFW) Advanced Workbook ", Monitor Forcepoint logging servers health. "description": "Gain threat intelligence correlated security and application insights on Forcepoint NGFW (Next Generation Firewall). "workbookKey": "ForcepointNGFWAdvanced ", "provider": "Microsoft Sentinel community " "templateRelativePath": "AttackSurfaceReduction.json ", "title": "Attack Surface Reduction Dashboard ", The workbook can filter on ASR rules in Audit mode and Block mode. "description": "This workbook helps you implement the ASR rules of Windows/Defender, and to monitor them over time. "logoFileName": "M365securityposturelogo.svg ", "workbookKey": "AttackSurfaceReduction ", "templateRelativePath": "42CrunchAPIProtectionWorkbook.json ", "title": "42Crunch API Protection Workbook ", ![]() "description": "Monitor and protect APIs using the 42Crunch API microfirewall ", "workbookKey": "42CrunchAPIProtectionWorkbook ",
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |