This commit is contained in:
lomayor
2020-02-11 18:57:42 -08:00
parent 05e01cf792
commit 921ea7c83a
2 changed files with 4 additions and 2 deletions

View File

@ -31,7 +31,8 @@ You can use the same threat-hunting queries to build custom detection rules. The
## Get started with advanced hunting ## Get started with advanced hunting
Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast. Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast.
<p></p> <p></p>
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo]
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo]
You can also go through each of the following steps to ramp up your advanced hunting knowledge. You can also go through each of the following steps to ramp up your advanced hunting knowledge.

View File

@ -28,7 +28,8 @@ Threat analytics is a set of reports published by Microsoft security researchers
Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them. Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them.
<p></p> <p></p>
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f]
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f]
## View the threat analytics dashboard ## View the threat analytics dashboard