Session
How to build an Entra-ordinary Security Monitoring
Effective security monitoring goes beyond simply enabling Defender products and deploying rule templates. It requires a strategic approach which includes a phased rollout and defined maturity model. This session explores how to start with Defender XDR signals and alerts as a foundation to identify critical threats and go far beyond this with custom detection engineering.
We'll discuss key gaps in the threat landscape, highlighting areas that require adjustment or development for detection engineering in certain areas. Learn how to choose and adjust Analytic Rules to create a well-tuned, actionable rule set while customizing detections from the Content Hub and community solutions.
Alert fatigue is a common challenge — so we'll explore scenario-based incidents using correlation as a more efficient approach to signal management. Additionally, UEBA-driven anomaly detection will be covered, showcasing how behavioral analytics can help identify emerging threats.
Join us to gain practical insights, optimize detection rules, and learn which strategies are effective to achieve a happy SOC by reducing noise and effort in your environment.

Christopher Brumm
ITSec Pro focussed on MS Cloud Stuff
Hamburg, Germany
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top