What are Microsoft Sentinel Data Connectors?
Understanding the "plumbing" of Microsoft Sentinel.
Understanding the "plumbing" of Microsoft Sentinel.
A quick reference guide for common KQL operators and queries.
A quick description of how PAC files work.
Exploring a foundation of identity service.
A quick walk-through of HEC.
A brief intro to a big topic.
A quick exploration of risk management.
A walkthrough of various DLP techniques.
A quick explanation of popular casing styles.
Unpacking the deployment methodology for ZPA.
A helpful technique for extracting contents from minimal containers.
Simple principles for optimizing connectivity to M365.
cyber-101
Let's discuss the thought process for defining and implementing bandwidth control in Zscaler.
cyber-101
Clarifying the differences between a couple similar terms.
cyber-101
How do we know that file type is REALLY that file type?
cyber-101
How picky can we be with Zscaler cloud app control?
cyber-101
Understanding the ingredients for risk...
cyber-101
A brief walk-through of the recommended phases to rollout TLS inspection.
coding-101
A very brief intro to comparing these AI systems.
cyber-101
How can Zscaler client connector tell it's on a trusted network?
cyber-101
Sequential steps and thought process for deploying the Zscaler client connector app.
cyber-101
A quick recap of what things the client connector can look for to assess local security state of an endpoint.
cyber-101
Defining agility of change updates on ZCC.
cyber-101
Exploring features and functionality for the client connector