handmade.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
handmade.social is for all handmade artisans to create accounts for their Etsy and other handmade business shops.

Server stats:

36
active users

#sentinel

1 post1 participant0 posts today

Glacial Lake Mapping Using Remote Sensing Geo-Foundation Model
--
doi.org/10.1016/j.jag.2025.104 <-- shared paper
--
HIGHLIGHTS:
• Proposed U-ViT model based on Prithvi GFM for multi-sensor glacial lake mapping.
• Achieved an F1 score of 0.894 on Sentinel-1&2, surpassing CNNs scoring below 0.8.
• Maintains strong performance with 50% less training data, proving efficiency.
• Excels in detecting small lakes (<0.01km²) and handling clouds and complex terrains..."
#GIS #spatial #mapping #glaciallake #GeospatialFoundationModel #satellite #Sentinel #GaoFen #remotesensing #earthobservation #model #modeling #climatechange #glacial #glacier #melt #melting #UViT #deepleanring #AI #framework #performance #metrics #opensource

Companies often do not want to send some data sources to #Sentinel because they contain large amounts of data and are therefore expensive. But did you know that you can set up filters and collect only what you really need?

The so-called Data Collection Rules (#DCR) are used for this purpose. They are commonly used to filter, for example, specific event IDs within Windows Security Events.

But did you know that you can also use them to filter data from built-in connectors, typically from Microsoft Entra ID for example? techcommunity.microsoft.com/bl

🛰️📷 La province de Valence le 31 octobre à 18h02 UTC par un satellite #Sentinel : les zones directement touchées par les inondations en bleu et les zones présentant des traces d'inondation résiduelles indiquées en vert clair.
La carte révèle que plus de 53 000 hectares ont été touchés par les inondations, avec plus de 190 000 personnes et 3 200 km de routes potentiellement touchées.
📷 Copernicus Emergency Management Service data

The article provides a comprehensive guide on how to use Bicep, a domain-specific language that uses declarative syntax to deploy Azure resources. It offers advantages over Azure Resource Management (ARM) templates such as smaller file size, integrated parameter files and better support for tools like Visual Studio code. The author explains in detail how to create a Microsoft Sentinel instance using Bicep templates, including setting up parameters, creating the Log Analytics workspace and deploying solutions via PowerShell scripts.

If you're interested in learning more about using Bicep for Microsoft Sentinel deployment or looking for tips on how to optimize your usage of this powerful tool, check out the full article. You'll find detailed examples of code snippets and useful links to further resources.
Post generated with the help of Azure OpenAI GPT4 🤖 #msftadvocate #Sentinel #AzureSentinel techcommunity.microsoft.com/t5

TECHCOMMUNITY.MICROSOFT.COMDeploy Microsoft Sentinel using BicepBicep is becoming a popular way of deploying Microsoft Sentinel.  This article will show how this can be done as well as deploying solutions from the Content..

As digital environments expand, Security Operations teams are often faced with the challenge of optimizing costs while dealing with an exponential increase in data. This article outlines a strategy to reduce data volume and retain important information using Data Collection Rules (DCRs). The authors discuss how to decide what's important in a log for your organization and demonstrate the process of using DCRs to discard unnecessary information from logs. They also caution that only you can decide what’s essential for your organization in a particular log or table.

The authors delve into two types of DCRs: standard and workspace, explaining their use cases. They then guide readers on identifying high-volume sources, determining high-volume tables, record level analysis, column level analysis, and examining the process using two examples – AADNonInteractiveSigninLogs and SecurityEvent. In conclusion, they emphasize that as digital footprints grow exponentially, it is increasingly crucial for security teams to be judiciously intentional about the data they collect and retain. To learn more about this strategy and its application through practical examples, read the full article.
Post generated with the help of Azure OpenAI GPT4 🤖 #msftadvocate #Sentinel #AzureSentinel techcommunity.microsoft.com/t5

TECHCOMMUNITY.MICROSOFT.COMSave money on your Sentinel ingestion costs with Data Collection RulesLearn how to reduce your data volume while also collecting the information with the highest security/detective value to your org.

Some Sentinel users have noticed that several data connectors they were using are now showing as deprecated in the user interface. However, this change doesn't mean your data has stopped flowing; it's still being delivered to the CommonSecurityLog or Syslog table and analytic rules are still applying to the data. The deprecation is due to a switch from log analytics agent (MMA or OMS agent) to Azure Monitor Agent (AMA), which provides benefits like faster performance and support for multihoming.

The new AMA allows you to use a single connector, such as Common Event Format for AMA, instead of multiple different ones based on specific solutions. If you've already shifted to the Common Event Format data connector and want to delete the deprecated connectors, be aware there's currently an error preventing this but a fix is coming soon. To learn more about these changes and how they could benefit you, check out the full article.
Post generated with the help of Azure OpenAI GPT4 🤖 #msftadvocate #Sentinel #AzureSentinel techcommunity.microsoft.com/t5

TECHCOMMUNITY.MICROSOFT.COMWhat to do if your Sentinel Data Connector shows as [DEPRECATED]Several Sentinel users raised the alarm that several of the data connectors they were using suddenly show as deprecated in the user interface.

The article discusses the Use Case Mapper Workbook, a tool that can help identify gaps in your Sentinel environment and established Content-Hub-Solutions. The workbook maps common use cases to the Mitre ATT&CK framework, providing an overview of available analysis options in Sentinel. It identifies several use cases such as Credential Exploitation, Lateral Movement, Rapid Encryption among others. The workbook also allows for customization by reducing results to selected Data Sources.

The post further provides a step-by-step guide on how to deploy and get started with the Use Case Mapper Workbook. It outlines prerequisites like having an Azure subscription with a Sentinel equipped Log Analytic Workspace and correct RBAC roles assigned. Once deployed, it explains how you can select predefined use cases and data sources/solutions within the workbook for your specific needs. To learn more about this invaluable tool that simplifies supplementing solutions for complete implementation while staying updated on new hunting queries, analytic rules or workbooks, check out the full article.
Post generated with the help of Azure OpenAI GPT4 🤖 #msftadvocate #Sentinel #AzureSentinel techcommunity.microsoft.com/t5

TECHCOMMUNITY.MICROSOFT.COMIntroducing the Use Cases Mapper workbook1. IntroWhile looking for the most effective use cases for Sentinel, it usually makes sense to start with data sources that already exist in some way in the..

A summary update on Azure News that includes updates released from Microsoft Azure related to Azure, Architecture, Compute, and Sentinel topics. Every update is linked to it's original Microsoft Azure, Microsoft Sentinel or other blog source. Hopefully this will save you some time digging around to find recent releases and changes. #aistudio #automation #azurecloud #azurenews #log #ncv3 #news #nvads #sentinel #sphere #sql

azuretracks.com/?p=2519

azuretracks.comAzure Updates - Number 99 - October 5, 2024A summary update on Azure news that includes updates released from Microsoft Azure related to Azure, Architecture, Compute, Security Copilot and Sentinel topics. Save time digging around to find recent releases and changes.

The article discusses Cowrie, an advanced honeypot designed to emulate SSH (Secure Shell) and Telnet services to attract, detect, and analyze malicious activities. As a cybersecurity tool, Cowrie creates a controlled environment that mimics real systems to lure attackers. It logs their activities in detail, providing valuable insights into their methods and motives. The features of Cowrie include SSH and Telnet emulation, detailed logging of attempted commands, file and command logging for comprehensive view of attacker's activities among others.

Cowrie is beneficial as it provides threat intelligence by observing interactions with the honeypot; detects unknown threats not caught by traditional security measures; improves security posture based on data collected from the honeypot; and offers low risk deployment since any malicious activity targeting the honeypot does not affect actual production systems. Integrating Cowrie with Microsoft Sentinel enhances cybersecurity operations through intelligent security analytics across the enterprise. To learn more about how you can utilize this powerful tool for your organization's cybersecurity needs or if you're interested in installing Cowrie on Linux or leveraging Microsoft Sentinel with Cowrie, check out the full post.
Post generated with the help of Azure OpenAI GPT4 🤖 #msftadvocate #Sentinel #AzureSentinel techcommunity.microsoft.com/t5

TECHCOMMUNITY.MICROSOFT.COMCowrie honeypot and its Integration with Microsoft Sentinel.Honeypot: Honeypot is a security mechanism designed to attract, detect, and analyze malicious activities and attackers by simulating a vulnerable system or..

Microsoft has revamped its Sentinel Ninja Training program to keep pace with the rapidly changing cybersecurity landscape. The training now offers a more interactive experience, including updated modules, hands-on labs and real-world scenarios. It covers everything from threat detection to incident response and automation, ensuring you gain practical skills for optimizing your security operations. A major update is the integration of Sentinel into the Defender XDR portal which simplifies workflows and speeds up incident response.

The training also provides step-by-step guidance through official Microsoft Sentinel documentation, exclusive webinars and up-to-date blog posts from experts at Microsoft. If you're looking to enhance your Sentinel skills or want to explore the new features of this program, head over to their blog post on 'Become a Microsoft Sentinel Ninja: The Complete Level 400'. Don't miss out on this opportunity - your next cybersecurity breakthrough could be just one click away!
Post generated with the help of Azure OpenAI GPT4 🤖 #msftadvocate #Sentinel #AzureSentinel techcommunity.microsoft.com/t5

TECHCOMMUNITY.MICROSOFT.COMLevel Up Your Security Skills with the New Microsoft Sentinel Ninja Training!If you’ve explored our Microsoft Sentinel Ninja Training in the past, it’s time to revisit! Our training program has undergone some exciting changes to keep..