12:05
SIEM Solution | Data Normalization and Indexing
287 views • 2 weeks ago
7:18
SIEM Solution | How data parsing works in SIEM solutions?
198 views • 2 weeks ago
3:22
SIEM Solution | How data is stored in SIEM solutions?
232 views • 3 weeks ago
7:09
SIEM solution | How data ingestion works in SIEM solutions?
305 views • 3 weeks ago
4:32
SIEM Solution | What are data types in SIEM solutions?
175 views • 3 weeks ago
10:27
What is SIEM Solution? | Security Information and Event Management
454 views • 3 weeks ago
17:07
Azure Monitor | Deploy Azure Monitor Agent on Linux | Data Collection Rule | Tutorial
812 views • 1 month ago
18:24
Azure Monitor | Custom Windows Logs Collection | Azure Monitor Agent
807 views • 1 month ago
1:22
SIEM Playlist - Released
275 views • 1 month ago
11:30
Azure Monitor | Best Practices - Data Collection Rules Deployment | Detailed Video
1.5K views • 4 months ago
21:52
Azure Monitor | Deploy Azure Monitor Agent on Windows Servers | Data Collection Rule | Tutorial
5.8K views • 4 months ago
24:10
Azure Monitor | Data Collection Rules | Detailed Video
4K views • 4 months ago
15:50
Azure Monitor | What Azure Monitor Agent?
6.3K views • 4 months ago
32:23
Microsoft Azure Log Analytics Workspace | Detailed Tutorial
8.4K views • 4 months ago
16:53
Microsoft Azure Log Analytics Worksapce
10K views • 7 months ago
17:35
Microsoft Azure REST API Tutorial | PowerShell | Oauth2.0 Client Credential Flow
2.5K views • 7 months ago
12:18
Microsoft Azure REST API Tutorial | Postman | Oauth2.0 Client Credential Flow
4.6K views • 8 months ago
27:09
Detailed Video - Microsoft Azure REST API Tutorial | Postman | Oauth2.0 Authorization Code Flow
14K views • 8 months ago
47:36
Azure Arc- Enabled Servers | Portal walkthrough and Architecture
4.7K views • 8 months ago
13:37
Azure Arc-Enabled Servers | Linux Server Onboarding
1.3K views • 8 months ago
30:01
Azure Arc | Onboard Windows Servers from Group Policy Object
3.3K views • 10 months ago
14:14
Ransomware Protection | Enable Controlled Folder Access from Microsoft Intune | Microsoft Defender
1.3K views • 10 months ago
13:03
Ransomware Protection | Enable Controlled Folder Access from Group Policy Object |Microsoft Defender
789 views • 10 months ago
28:14
Ransomware Protection | Configure Controlled folder Access | Microsoft defender for Endpoint
1.8K views • 10 months ago
9:47
Ransomware Protection | Controlled Folder Access | Microsoft Defender for Endpoint
1.6K views • 10 months ago
23:58
Deploy Attack Surface Reduction Rules from Microsoft Intune
6K views • 1 year ago
11:56
Configure Attack Surface Reduction Rules | Group Policy
2.1K views • 1 year ago
12:06
Configure Attack Surface Reduction rules | Powershell
1.6K views • 1 year ago
8:02
Attack Surface Reduction | Deployment workflow | Microsoft Defender for Endpoint
1.1K views • 1 year ago
14:41
Attack Surface Reduction Rules | Deployment Methods and Modes
2.4K views • 1 year ago
Load More