97. Microsoft Azure Sentinel
97. Microsoft Azure Sentinel
Jelle and Gerben talk about Microsoft Azure Sentinel. They discuss how to set up monitoring and incident response, demonstrating how Sentinel can be used to centralize security data from Azure activity logs for better visibility and automated response. Key points include ingesting logs into a Log Analytics workspace, using content packs for data connectors and analytics rules, and scanning data at the subscription or resource group level. They also show how logs can be analyzed for potential threats using queries and custom alerts. Their discussion emphasizes starting small, continuously improving rules and workbooks over time based on detected signals, and considering red team testing to evaluate detection capabilities.
Links for more information:
More videos
-
129. Pattern Matching in C-sharp: Getting Started
In this Betatalks episode, Christian and Yvo show how C# pattern matching simplifies if/else logic, making business rules clearer, safer, and more concise.
Content typeVideo
-
128. How to Benchmark your .NET code
In this Betatalks episode, Christian and Jelle show how BenchmarkDotNet measures .NET performance, comparing string concatenation with StringBuilder to spot regressions.Content typeVideo
-
127. AI and RAG Scenarios Using Just SQL Server 2025
Christian and Jelle explore SQL Server 2025 AI features, showing embeddings, vector search, and semantic queries to build RAG style solutions directly in SQL.
Content typeVideo
Stay up to date with our Betatalks and tech updates!
Sign up and receive a biweekly update with the latest knowledge and developments.