Microsoft Defender for Endpoint (MDE) with Plan 2 provides a really great and relatively affordable way of ingesting large-scale events into your SIEM, like Microsoft Continue […]
Effective access control is the keystone of any secure, well‑managed Microsoft Sentinel deployment. By carefully scoping permissions at each level—from your Azure tenant down to Continue […]
Updated — 15/07/2025 — Starting 1 May 2025, Microsoft will begin billing for queries and search jobs on logs ingested into the Auxiliary Logs plan. Querying Auxiliary Continue […]
[Azure Updates] The Delete Data API lets you make asynchronous requests to remove data, such as sensitive, personal, or corrupt from your Log Analytics workspace. This […]
In today’s hybrid and multi-cloud world, securing log data is critical for any organization’s cybersecurity posture. Microsoft Sentinel is a cloud-native Security Information and Event Continue […]
Introduction A quick blog to demonstrate a solution for enforcing that Log Analytic Workspaces in your environment are created with a daily quota property value set. […]
The text explains the process of managing Azure subscriptions, particularly how to cancel a subscription and track its status using Azure Monitor and Log Analytics. It […]
When we deploy Azure Enterprise Scale Landing Zones, We often advise our customers to use a centralised Log Analytics workspace for all their Azure resources and […]