Рет қаралды 961
In this webinar you will learn about a variety of solutions for log collection methods such as Logstash, CEF, and WEF and the scenarios we often encounter such as permissions restriction to tables, log filtering, collecting logs from AWS and GCP, Office 365 raw logs, and more. We’ll also review some of the new features of Azure Monitor Agent.
► Subscribe to Microsoft Security on KZbin here: aka.ms/Subscri...
► Follow us on social:
LinkedIn: / microsoft-security
Twitter: / msftsecurity
► Join our Tech Community: aka.ms/Securit...
► For more about Microsoft Security: msft.it/6002T9HQY