mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-25 11:47:23 +00:00
Videos for TA and AH
This commit is contained in:
parent
0229128fb6
commit
811e8be792
@ -29,8 +29,11 @@ Advanced hunting is a query-based threat-hunting tool that lets you explore up t
|
|||||||
You can use the same threat-hunting queries to build custom detection rules. These rules run automatically to check for and respond to various events and system states, including suspected breach activity and misconfigured machines.
|
You can use the same threat-hunting queries to build custom detection rules. These rules run automatically to check for and respond to various events and system states, including suspected breach activity and misconfigured machines.
|
||||||
|
|
||||||
## Get started with advanced hunting
|
## Get started with advanced hunting
|
||||||
|
Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast.
|
||||||
|
|
||||||
We recommend going through several steps to quickly get up and running with advanced hunting.
|
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo]
|
||||||
|
|
||||||
|
You can also go through each of the following steps to ramp up your advanced hunting knowledge.
|
||||||
|
|
||||||
| Learning goal | Description | Resource |
|
| Learning goal | Description | Resource |
|
||||||
|--|--|--|
|
|--|--|--|
|
||||||
|
@ -26,6 +26,11 @@ Cyberthreats are emerging more frequently and prevalently. It is critical for or
|
|||||||
|
|
||||||
Threat analytics is a set of reports published by Microsoft security researchers as soon as emerging threats and outbreaks are identified. The reports help you assess the impact of threats to your environment and identify actions that can contain them.
|
Threat analytics is a set of reports published by Microsoft security researchers as soon as emerging threats and outbreaks are identified. The reports help you assess the impact of threats to your environment and identify actions that can contain them.
|
||||||
|
|
||||||
|
Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them.
|
||||||
|
|
||||||
|
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f]
|
||||||
|
|
||||||
|
|
||||||
## View the threat analytics dashboard
|
## View the threat analytics dashboard
|
||||||
|
|
||||||
The threat analytics dashboard is a great jump off point for getting to the reports that are most relevant to your organization. It provides several overviews about the threats covered in the reports:
|
The threat analytics dashboard is a great jump off point for getting to the reports that are most relevant to your organization. It provides several overviews about the threats covered in the reports:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user