ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

From Alert to Resolution: Using Security Agents to Power Real‑World SOC Workflows

Автор: Microsoft Security Community

Загружено: 2026-02-25

Просмотров: 601

Описание: Wednesday, Februray 25th 2026 | 8:00AM – 9:00AM (PT, Redmond Time webinar recording date)

Microsoft Security Store | From Alert to Resolution: Using Security Agents to Power Real‑World SOC Workflows

Presenters: Pablo Chacon, Ankur Arora, Ugur Koc, and Konrad Sagala

Description:
In this webinar, we’ll show how SOC analysts can harness security agents from Microsoft Security Store to strengthen every stage of the incident lifecycle. Through realistic SOC workflows based on everyday analyst tasks, we will follow each scenario end to end, beginning with the initial alert and moving through triage, investigation, and remediation. Along the way, we’ll demonstrate how agents in Security Store streamline signal correlation, reduce manual investigation steps, and accelerate decision‑making when dealing with three of the most common incident types: phishing attacks, credential compromise, and business email compromise (BEC), helping analysts work faster and more confidently by automating key tasks, surfacing relevant insights, and improving consistency in response actions.

Timestamps:
00:00 – Introduction
03:17 – Discovering, buying, and setting up Security Agents
Responding to SOC scenarios assisted by security agents
12:15 – Demo 1: Phishing attack scenario
24:54 – Demo 2: Account takeover / Business email compromise
40:50 – Close

Discover, try, activate Security Agents today!

Visit the Microsoft Security Store at : https://securitystore.microsoft.com/a...

For Partners: Toolkit for creating and publishing Security Copilot Agents: http://aka.ms/SecurityCopilotDevelope...

Coming to RSA Conference 2026? Let’s meet: https://aka.ms/MeetUsAtRSA

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
From Alert to Resolution: Using Security Agents to Power Real‑World SOC Workflows

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Cyberpunk Hi-Tech Glitchy Neon Gamepad Background video | Footage | Screensaver

Cyberpunk Hi-Tech Glitchy Neon Gamepad Background video | Footage | Screensaver

Prayer for a Broken Heart 🙏 Gregorian Chants for Emotional Healing & Peace

Prayer for a Broken Heart 🙏 Gregorian Chants for Emotional Healing & Peace

Agents That Actually Work: From an MVP

Agents That Actually Work: From an MVP

Build a unified access foundation

Build a unified access foundation

Internet Networks & Network Security | Google Cybersecurity Certificate

Internet Networks & Network Security | Google Cybersecurity Certificate

Secure access for the workforce in the AI era

Secure access for the workforce in the AI era

Data Security Investigations (DSI)

Data Security Investigations (DSI)

Cybersecurity Architecture: Who Are You? Identity and Access Management

Cybersecurity Architecture: Who Are You? Identity and Access Management

Bash Scripting Tutorial for Beginners

Bash Scripting Tutorial for Beginners

Хранилище данных против озера данных против хранилища данных | ETL, OLAP против OLTP

Хранилище данных против озера данных против хранилища данных | ETL, OLAP против OLTP

Cybersecurity Architecture: Networks

Cybersecurity Architecture: Networks

Фильм Алексея Семихатова «ГРАВИТАЦИЯ»

Фильм Алексея Семихатова «ГРАВИТАЦИЯ»

Альфред Кох – Путин 1990-х, бандиты, НТВ, Навальный / вДудь

Альфред Кох – Путин 1990-х, бандиты, НТВ, Навальный / вДудь

Identity Control Plane Under Attack: Consent Abuse and Hybrid Sync Risks

Identity Control Plane Under Attack: Consent Abuse and Hybrid Sync Risks

Security Copilot in Purview Technical Deep Dive

Security Copilot in Purview Technical Deep Dive

Understand and Improve your Microsoft Secure Score

Understand and Improve your Microsoft Secure Score

The Internet Was Weeks Away From Disaster and No One Knew

The Internet Was Weeks Away From Disaster and No One Knew

Zero-Click Attacks: AI Agents and the Next Cybersecurity Challenge

Zero-Click Attacks: AI Agents and the Next Cybersecurity Challenge

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

Introducing the UEBA Behaviors Layer in Microsoft Sentinel

Introducing the UEBA Behaviors Layer in Microsoft Sentinel

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]