- 필수 기능
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- 디지털 경험
- 소프트웨어 제공
- 보안
- 로그 관리
- 관리
- 인프라스트럭처
- ci
- containers
- csm
- ndm
- otel_guides
- overview
- slos
- synthetics
- tests
- 워크플로
Set up the azure integration.
Detect whenever Azure Identity Protection categorizes an Azure Active Directory login as risky.
Monitor Azure Active Directory sign in activity (@evt.name:"Sign-in activity"
) and generate a signal when Azure identifies the user as risky or compromised (@properties.riskState:"atRisk" OR "confirmedCompromised"
).
@network.client.geoip.subdivision.name
) of {{@usr.id}}
to determine if they’re logging into from their usual location.{{@usr.id}}
account.{{@usr.id}}
.14 June 2022 - Updated rule query.