Threat hunt with network evidence with endpoint telemetry

Threat hunt with network evidence with endpoint telemetry

Corelight and Microsoft show the power of combining network evidence with endpoint telemetry using Defender365 and Sentinel to analyse, investigate, and understand the full breadth of an attack.

During the session, we dive straight into the technology and how it can be applied using a simulated attack Demo.