Further reading
You can refer to the following links for more information on topics covered in this chapter:
- Hunt for threats with Microsoft Sentinel (https://docs.microsoft.com/en-us/azure/sentinel/hunting).
- Security Investigation with Microsoft Sentinel and Jupyter Notebooks – Part 1 (https://techcommunity.microsoft.com/t5/azure-sentinel/security-investigation-with-azure-sentinel-and-jupyter-notebooks/ba-p/432921)
- Security Investigation with Microsoft Sentinel and Jupyter Notebooks – Part 2 (https://techcommunity.microsoft.com/t5/azure-sentinel/security-investigation-with-azure-sentinel-and-jupyter-notebooks/ba-p/483466)
- Security Investigation with Microsoft Sentinel and Jupyter Notebooks – Part 3 (https://techcommunity.microsoft.com/t5/azure-sentinel/security-investigation-with-azure-sentinel-and-jupyter-notebooks/ba-p/561413)
- Create and manage Azure Machine Learning workspaces (https://docs.microsoft.com/en-us/azure/machine-learning...