Microsoft Sentinel in action /:
Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom thre...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2022.
|
Ausgabe: | Second edition. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Microsoft Sentinel, then this book is for you. Security experts using an alternative SIEM tool who want to adopt Microsoft Sentinel as an additional service or as a replacement will also find this book useful. |
Beschreibung: | 1 online resource (478 pages) : color illustrations |
ISBN: | 9781801813587 1801813582 |
Internformat
MARC
LEADER | 00000cam a22000007i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1298827776 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 220222s2022 enka o 000 0 eng d | ||
040 | |a ORMDA |b eng |e rda |e pn |c ORMDA |d OCLCO |d OCLCF |d N$T |d OCLCQ |d IEEEE |d OCLCO | ||
019 | |a 1346260327 | ||
020 | |a 9781801813587 |q (electronic bk.) | ||
020 | |a 1801813582 |q (electronic bk.) | ||
020 | |z 9781801815536 | ||
035 | |a (OCoLC)1298827776 |z (OCoLC)1346260327 | ||
037 | |a 9781801815536 |b O'Reilly Media | ||
037 | |a 10163181 |b IEEE | ||
050 | 4 | |a QA76.585 | |
082 | 7 | |a 004.67/82 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Diver, Richard, |e author. | |
245 | 1 | 0 | |a Microsoft Sentinel in action / |c Richard Diver, Gary Bushey, John Perkins. |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2022. | |
300 | |a 1 online resource (478 pages) : |b color illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from title details screen (O'Reilly, viewed February 22, 2022). | |
520 | |a Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Microsoft Sentinel, then this book is for you. Security experts using an alternative SIEM tool who want to adopt Microsoft Sentinel as an additional service or as a replacement will also find this book useful. | ||
505 | 0 | |a Table of Contents Getting started with Microsoft Sentinel Azure Monitor-Introduction to Log Analytics Managing and collecting data Integrating Threat Intelligence with Microsoft Sentinel Using the Kusto Query Language Microsoft Sentinel Logs and Writing Queries Creating Analytic Rules Creating and Using Workbooks Incident Management Configuring and Using Entity Behavior Threat Hunting in Microsoft Sentinel Creating Playbooks and Automation ServiceNow integration for Alert and Case Management Operational Tasks for Microsoft Sentinel Constant Learning and Community Contribution. | |
650 | 0 | |a Microsoft Azure (Computing platform) |0 http://id.loc.gov/authorities/subjects/sh2016001752 | |
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 6 | |a Infonuagique |x Sécurité |x Mesures. | |
650 | 6 | |a Microsoft Azure (Plateforme informatique) | |
650 | 7 | |a Microsoft Azure (Computing platform) |2 fast | |
700 | 1 | |a Bushey, Gary, |e author. | |
700 | 1 | |a Perkins, John, |e author. | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3164520 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3164520 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 3164520 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1298827776 |
---|---|
_version_ | 1829095367605485568 |
adam_text | |
any_adam_object | |
author | Diver, Richard Bushey, Gary Perkins, John |
author_facet | Diver, Richard Bushey, Gary Perkins, John |
author_role | aut aut aut |
author_sort | Diver, Richard |
author_variant | r d rd g b gb j p jp |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 |
callnumber-search | QA76.585 |
callnumber-sort | QA 276.585 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Table of Contents Getting started with Microsoft Sentinel Azure Monitor-Introduction to Log Analytics Managing and collecting data Integrating Threat Intelligence with Microsoft Sentinel Using the Kusto Query Language Microsoft Sentinel Logs and Writing Queries Creating Analytic Rules Creating and Using Workbooks Incident Management Configuring and Using Entity Behavior Threat Hunting in Microsoft Sentinel Creating Playbooks and Automation ServiceNow integration for Alert and Case Management Operational Tasks for Microsoft Sentinel Constant Learning and Community Contribution. |
ctrlnum | (OCoLC)1298827776 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05050cam a22004817i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1298827776</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">220222s2022 enka o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">ORMDA</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">ORMDA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1346260327</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801813587</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1801813582</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781801815536</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1298827776</subfield><subfield code="z">(OCoLC)1346260327</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781801815536</subfield><subfield code="b">O'Reilly Media</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10163181</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diver, Richard,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft Sentinel in action /</subfield><subfield code="c">Richard Diver, Gary Bushey, John Perkins.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (478 pages) :</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed February 22, 2022).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Microsoft Sentinel, then this book is for you. Security experts using an alternative SIEM tool who want to adopt Microsoft Sentinel as an additional service or as a replacement will also find this book useful.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Table of Contents Getting started with Microsoft Sentinel Azure Monitor-Introduction to Log Analytics Managing and collecting data Integrating Threat Intelligence with Microsoft Sentinel Using the Kusto Query Language Microsoft Sentinel Logs and Writing Queries Creating Analytic Rules Creating and Using Workbooks Incident Management Configuring and Using Entity Behavior Threat Hunting in Microsoft Sentinel Creating Playbooks and Automation ServiceNow integration for Alert and Case Management Operational Tasks for Microsoft Sentinel Constant Learning and Community Contribution.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Microsoft Azure (Computing platform)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2016001752</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Microsoft Azure (Plateforme informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Azure (Computing platform)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bushey, Gary,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Perkins, John,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3164520</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3164520</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">3164520</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1298827776 |
illustrated | Illustrated |
indexdate | 2025-04-11T08:47:54Z |
institution | BVB |
isbn | 9781801813587 1801813582 |
language | English |
oclc_num | 1298827776 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (478 pages) : color illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Diver, Richard, author. Microsoft Sentinel in action / Richard Diver, Gary Bushey, John Perkins. Second edition. Birmingham, UK : Packt Publishing, 2022. 1 online resource (478 pages) : color illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed February 22, 2022). Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Microsoft Sentinel, then this book is for you. Security experts using an alternative SIEM tool who want to adopt Microsoft Sentinel as an additional service or as a replacement will also find this book useful. Table of Contents Getting started with Microsoft Sentinel Azure Monitor-Introduction to Log Analytics Managing and collecting data Integrating Threat Intelligence with Microsoft Sentinel Using the Kusto Query Language Microsoft Sentinel Logs and Writing Queries Creating Analytic Rules Creating and Using Workbooks Incident Management Configuring and Using Entity Behavior Threat Hunting in Microsoft Sentinel Creating Playbooks and Automation ServiceNow integration for Alert and Case Management Operational Tasks for Microsoft Sentinel Constant Learning and Community Contribution. Microsoft Azure (Computing platform) http://id.loc.gov/authorities/subjects/sh2016001752 Cloud computing Security measures. Infonuagique Sécurité Mesures. Microsoft Azure (Plateforme informatique) Microsoft Azure (Computing platform) fast Bushey, Gary, author. Perkins, John, author. |
spellingShingle | Diver, Richard Bushey, Gary Perkins, John Microsoft Sentinel in action / Table of Contents Getting started with Microsoft Sentinel Azure Monitor-Introduction to Log Analytics Managing and collecting data Integrating Threat Intelligence with Microsoft Sentinel Using the Kusto Query Language Microsoft Sentinel Logs and Writing Queries Creating Analytic Rules Creating and Using Workbooks Incident Management Configuring and Using Entity Behavior Threat Hunting in Microsoft Sentinel Creating Playbooks and Automation ServiceNow integration for Alert and Case Management Operational Tasks for Microsoft Sentinel Constant Learning and Community Contribution. Microsoft Azure (Computing platform) http://id.loc.gov/authorities/subjects/sh2016001752 Cloud computing Security measures. Infonuagique Sécurité Mesures. Microsoft Azure (Plateforme informatique) Microsoft Azure (Computing platform) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2016001752 |
title | Microsoft Sentinel in action / |
title_auth | Microsoft Sentinel in action / |
title_exact_search | Microsoft Sentinel in action / |
title_full | Microsoft Sentinel in action / Richard Diver, Gary Bushey, John Perkins. |
title_fullStr | Microsoft Sentinel in action / Richard Diver, Gary Bushey, John Perkins. |
title_full_unstemmed | Microsoft Sentinel in action / Richard Diver, Gary Bushey, John Perkins. |
title_short | Microsoft Sentinel in action / |
title_sort | microsoft sentinel in action |
topic | Microsoft Azure (Computing platform) http://id.loc.gov/authorities/subjects/sh2016001752 Cloud computing Security measures. Infonuagique Sécurité Mesures. Microsoft Azure (Plateforme informatique) Microsoft Azure (Computing platform) fast |
topic_facet | Microsoft Azure (Computing platform) Cloud computing Security measures. Infonuagique Sécurité Mesures. Microsoft Azure (Plateforme informatique) |
work_keys_str_mv | AT diverrichard microsoftsentinelinaction AT busheygary microsoftsentinelinaction AT perkinsjohn microsoftsentinelinaction |