Simulating A Brute Force Attack & Investigating With Microsoft Sentinel

แชร์
ฝัง
  • เผยแพร่เมื่อ 16 ม.ค. 2025

ความคิดเห็น • 4

  • @seimseim-l5t
    @seimseim-l5t ปีที่แล้ว +1

    Brother Carl, first of all thank you for providing such a quality content. This is the most Unique Video on youtube on Microsoft Sentinel. Request to please make more videos or a series on Sentinel. KUDOS to you CARL.👏👏👏👏👏👏👏👏👏👏

  • @gertrudechi4427
    @gertrudechi4427 11 หลายเดือนก่อน

    Thank you carl.This was helpful.pls can you do more on other network attacks and something on DLP?Thanks

  • @plusvision100
    @plusvision100 9 หลายเดือนก่อน

    Can you do demo on sentinel detecting sql injection?

  • @michaelem7883
    @michaelem7883 10 หลายเดือนก่อน

    still not sure what is the adv of that solution. this query could be written on any LA workspace. and azure monitor alert setup as long as you send data to azure... such stuff like these attacks should be configured out of the box. So i must write my own KQL every time i want to monitor eg password spray attack? brute force still is unclear to me when machines are in the domain user have max 5 trys before lock.