Update: Log Horizon
Log Horizon 0.5.0 adds self-contained HTML export, deeper transform analysis, stronger hardening, and improved CI-friendly reporting for Microsoft Sentinel.
Practical Microsoft Sentinel, Defender XDR, and MISP guides focused on detection engineering, log strategy, and automation.
Browse field-tested walkthroughs on security monitoring architecture, cost optimization, threat intelligence pipelines, and practical detection engineering.
These are currently the most visited posts on the site.
A practical breakdown of the Microsoft Sentinel to Defender XDR migration, including architecture impact, correlation behavior, and planning considerations.
Create and manage Defender XDR custom detection rules through Microsoft Graph API with payload patterns, limits, and caveats.
Use a PowerShell module to manage Defender XDR custom detection rules via Graph API with support for impacted assets, response actions, and SPN auth.
Implement Entra ID privileged access controls with PIM, role hygiene, and operational guardrails for high-impact accounts.
A lab-based walkthrough testing SinkVPN techniques against Defender for Endpoint telemetry using a rogue VPN setup and controlled routing.
Build a practical Sentinel log baseline by mapping data sources to detection value, cost tiering, and operational outcomes.
Start here if you want a focused reading path by topic.
Cost control, retention choices, and data-tier planning for real-world Sentinel operations.
Detection design, custom rule operations, and Defender XDR execution patterns.
Threat intel ingestion, pipeline hardening, and MISP-to-Sentinel implementation patterns.
Securing Windows Server - Chapter 3, Part 2