Section 2: Data Connectors, Management, and Queries
In this section, you will learn how to collect data, manage data to prevent overspend, and query data for useful information as part of your threat hunting and other security activities.
This section contains the following chapters:
- Chapter 3, Managing and Collecting Data
- Chapter 4, Integrating Threat Intelligence with Microsoft Sentinel
- Chapter 5, Using the Kusto Query Language
- Chapter 6, Microsoft Sentinel Logs and Writing Queries