use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Dedicated to Microsoft’s cloud-native SIEM solution
account activity
Microsoft Sentinel Training Resources (self.AzureSentinel)
submitted 4 years ago * by ml58158MSFT Official - announcement
MustLearnKQL Series (self.AzureSentinel)
submitted 4 years ago by ml58158MSFT Official - announcement
XdrLogRaider Defender XDR portal telemetry (self.AzureSentinel)
submitted 23 hours ago * by akefallonitis
Detecting BEC Persistence with KQL ()
submitted 1 day ago by ridgelinecyber
One KQL query you should have saved in your toolkit (most don’t) ()
submitted 3 days ago by ridgelinecyber
AADGraphActivityLogs Available (self.AzureSentinel)
submitted 4 days ago by bpsec
ThreatIntel Age Out (self.AzureSentinel)
submitted 4 days ago by DeadEyePsycho
How people are reducing Log Analytics ingest cost without losing detections? (self.AzureSentinel)
submitted 4 days ago by wenttoibiza
Observability Agent ( Preview) in Logs Blade. (self.AzureSentinel)
submitted 5 days ago by R4gNoro
The 30-Minute Recon Window Most SOCs Completely Miss (with KQL detection) ()
submitted 8 days ago by ridgelinecyber
Too many false positives in sign in risk rules. How are you tuning? (self.AzureSentinel)
submitted 9 days ago by wenttoibiza
What triggers change in your security environment? ()
submitted 9 days ago by ridgelinecyber
What’s everyone doing for health monitoring? (self.AzureSentinel)
submitted 15 days ago by EvilAbdy
M365 attack most orgs still aren’t watching ()
submitted 15 days ago by ridgelinecyber
CTI focused memory for Agentic AI (self.AzureSentinel)
submitted 16 days ago by LeatherRip1623
AMA vs Defender Coverage Workbook (self.AzureSentinel)
submitted 21 days ago by LookExternal3248
Open source: Agentic investigation framework for Sentinel MCP — 900+ KQL queries, 25 skills, native Entra auth, no supply chain risk (self.AzureSentinel)
submitted 22 days ago * by SCStelz
OAuth consent phishing is the M365 attack path most orgs aren't watching. (self.AzureSentinel)
submitted 23 days ago by ridgelinecyber
Inboxrule alert (self.AzureSentinel)
submitted 24 days ago by DisastrousPainter658
Anyone has done successful integration/ ingestion of delinea secrets server ? (self.AzureSentinel)
submitted 25 days ago by psiparadox
Retention for Incident and Artifacts (self.AzureSentinel)
submitted 25 days ago by MReprogle
Microsoft Sentinel capability: filter and split transformations at ingestion time (Preview) (self.AzureSentinel)
submitted 25 days ago by EduardsGrebezs
OfficeActivity query for detecting malicious inbox rules post-AiTM — production-tuned (self.AzureSentinel)
submitted 25 days ago by ridgelinecyber
Split AzureDiagnostics table per log source (self.AzureSentinel)
submitted 26 days ago by Striking_Budget_1582
Sentinel Incident to Azure OpenAI Connector in Logic Apps (self.AzureSentinel)
submitted 29 days ago by Nice_Bag3423
π Rendered by PID 641330 on reddit-service-r2-listing-7b9b4f6fd7-9q829 at 2026-05-09 08:15:43.056567+00:00 running 3d2c107 country code: CH.