DarmantoCerita CHFI v1.0Cerita Ini membahas peran forensik komputer di dunia saat ini. Forensik komputer memainkan peran penting dalam penyelidikan dan penuntutan…May 30, 2022May 30, 2022
DarmantoIngest log data with data connectorsTo collect log data, you need to connect your data sources with Microsoft Sentinel Connectors. The Data Connectors page displays a growing…Apr 25, 2022Apr 25, 2022
DarmantoDefine threat intelligenceCyber threat intelligence (CTI) can come from many sources, such as open-source data feeds, threat intelligence-sharing communities, paid…Apr 22, 2022Apr 22, 2022
DarmantoWhen to use Microsoft SentinelMicrosoft Sentinel is a solution for performing security operations on your cloud and on-premises environments.Apr 22, 2022Apr 22, 2022
DarmantoHow Microsoft Sentinel worksAs you’ve already learned, Microsoft Sentinel helps you enable end-to-end security operations. It starts with log ingestion and continues…Apr 22, 2022Apr 22, 2022
DarmantoWhat is security information and event management (SIEM)?A SIEM system is a tool that an organization uses to collect, analyze, and perform security operations on its computer systems. Those…Apr 22, 2022Apr 22, 2022
DarmantoManage indicatorsIndicator of compromise (IoCs) matching is an essential feature in every endpoint protection solution. This capability gives SecOps the…Apr 22, 2022Apr 22, 2022