Skip to content

Latest commit

 

History

History
49 lines (37 loc) · 2.94 KB

File metadata and controls

49 lines (37 loc) · 2.94 KB

Scenario Notebooks

This contains notebooks designed for use by you in Microsoft Sentinel. Some of these are intended to illustrate specific techniques or investigation approaches


List of notebooks

<style> .nb_table, th, td { border: 1px solid; text-align: left; border-collapse=collapse; margin-left: auto; margin-right: auto; } .width-f { width: 10px !important; } .width-nb { width: 300px !important; } </style>
NotebookFolder
AffectedKeyCredentials-CVE-2021-42306.ipynbscenario-notebooks
AutomatedNotebooks-IncidentTriage.ipynbscenario-notebooks
AutomatedNotebooks-Manager.ipynbscenario-notebooks
Guided Hunting - Detect potential network beaconing using Apache Spark via Azure Synapse.ipynbscenario-notebooks
Guided Hunting - Office365-Exploring.ipynbscenario-notebooks
Guided Investigation - MDE Webshell Alerts.ipynbscenario-notebooks
Guided Investigation - WAF data.ipynbscenario-notebooks
Guided Analysis - User Security Metadata.ipynbscenario-notebooks/UserSecurityMetadata

Viewing the notebooks

You can view any of the notebooks directly on GitHub just by clicking on them.

For higher fidelity rendering we'd recommend Jupyter nbviewer.

  • Open a notebook here and copy the URL (or copy the a link from the table above)
  • Go to https://nbviewer.jupyter.org/ and paste the URL into the location text box.
  • Hit the Go! button