Azure's
repositories
|
.github
|
azure-hunting
|
machine-learning-notebooks
|
mitremap-notebook
|
scenario-notebooks
|
src
|
tutorials-and-examples
|
utils
|
A Getting Started Guide For Azure Sentinel ML Notebooks.ipynb
|
A Getting Started Guide For PowerShell AML Notebooks.ipynb
|
A Tour of Cybersec notebook features.ipynb
|
Configurate Azure ML and Azure Synapse Analytics.ipynb
|
ConfiguringNotebookEnvironment.ipynb
|
Credential Scan on Azure Blob Storage.ipynb
|
Credential Scan on Azure Data Explorer.ipynb
|
Credential Scan on Azure Log Analytics.ipynb
|
Entity Explorer - Account.ipynb
|
Entity Explorer - Domain and URL.ipynb
|
Entity Explorer - Host.ipynb
|
Entity Explorer - IP Address.ipynb
|
Entity Explorer - Linux Host.ipynb
|
Entity Explorer - Windows Host.ipynb
|
Guided Hunting - Anomalous Office365 Exchange Sessions.ipynb
|
Guided Hunting - Azure Resource Explorer.ipynb
|
Guided Hunting - Base64-Encoded Linux Commands.ipynb
|
Guided Hunting - Covid-19 Themed Threats.ipynb
|
Guided Hunting - Detect potential network beaconing using Apache Spark via Azure Synapse.ipynb
|
Guided Hunting - Investigating Malicious Links Shared in Teams.ipynb
|
Guided Investigation - Anomaly Lookup.ipynb
|
Guided Investigation - Azure WAF SQLI.ipynb
|
Guided Investigation - Fusion Incident.ipynb
|
Guided Investigation - Incident Triage.ipynb
|
Guided Investigation - Process-Alerts.ipynb
|
Guided Investigation - Solarwinds Post Compromise Activity.ipynb
|
Guided Triage - Alerts.ipynb
|
Hands-on 1. Data Discovery using Azure REST API.ipynb
|
Hands-on 2. Surfing Data using Azure SDK.ipynb
|
Machine Learning in Notebooks Examples.ipynb
|
Sentinel Bulk Logs Export.ipynb
|
.gitignore
|
CODE_OF_CONDUCT.md
|
CONTRIBUTING.md
|
LICENSE
|
PUBLISHING.md
|
README.md
|
SECURITY.md
|
azure-pipelines.yml
|
config.json
|
msticpyconfig.yaml
|
msticpyconfig.yaml.sample
|
notebookmetadata.json
|
requirements.txt
|