Udalosti
Vytváranie aplikácií a agentov umelej inteligencie
17. 3., 21 - 21. 3., 10
Pripojte sa k sérii meetup a vytvorte škálovateľné riešenia AI na základe prípadov reálneho používania so spolupracovníkmi a odborníkmi.
Zaregistrovať saTento prehliadač už nie je podporovaný.
Inovujte na Microsoft Edge a využívajte najnovšie funkcie, aktualizácie zabezpečenia a technickú podporu.
Threat & vulnerability management assessment events, indicating the status of various security configurations on devices.
Attribute | Value |
---|---|
Resource types | - |
Categories | Security |
Solutions | SecurityInsights |
Basic log | No |
Ingestion-time transformation | Yes |
Sample Queries | Yes |
Column | Type | Description |
---|---|---|
_BilledSize | real | The record size in bytes |
ConfigurationCategory | string | Category or grouping to which the configuration belongs |
ConfigurationId | string | Unique identifier for a specific configuration |
ConfigurationImpact | real | Rated impact of the configuration to the overall configuration score (1-10) |
ConfigurationSubcategory | string | Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features. |
Context | dynamic | Machine data configuration context |
DeviceId | string | Unique identifier for the device in the service |
DeviceName | string | Fully qualified domain name (FQDN) of the device |
IsApplicable | bool | Indicates whether the configuration or policy is applicable |
_IsBillable | string | Specifies whether ingesting the data is billable. When _IsBillable is false ingestion isn't billed to your Azure account |
IsCompliant | bool | Indicates whether the configuration or policy is properly configured |
IsExpectedUserImpact | bool | Indicates if user impact is expected when configuration applied |
OSPlatform | string | Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7 |
SourceSystem | string | The type of agent the event was collected by. For example, OpsManager for Windows agent, either direct connect or Operations Manager, Linux for all Linux agents, or Azure for Azure Diagnostics |
TenantId | string | The Log Analytics workspace ID |
TimeGenerated | datetime | Date and time when the record was generated |
Timestamp | datetime | Date and time when the record was generated |
Type | string | The name of the table |
Udalosti
Vytváranie aplikácií a agentov umelej inteligencie
17. 3., 21 - 21. 3., 10
Pripojte sa k sérii meetup a vytvorte škálovateľné riešenia AI na základe prípadov reálneho používania so spolupracovníkmi a odborníkmi.
Zaregistrovať saŠkolenie
Modul
Beveiligingsbewakings- en automatiseringsoplossingen configureren en beheren - Training
Meer informatie over het instellen van Azure Monitor en Microsoft Sentinel voor automatische beveiligingsbewaking en -respons in cloudinstellingen.
Certifikácia
Microsoft Gecertificeerd: Beveiligingsoperatiesanalist Associate - Certifications
Bedreigingen onderzoeken, zoeken en beperken met Behulp van Microsoft Sentinel, Microsoft Defender voor Cloud en Microsoft 365 Defender.