Path Lines of Code A Getting Started Guide For PowerShell AML Notebooks.ipynb 1352 A Tour of Cybersec notebook features.ipynb 4283 Configurate Azure ML and Azure Synapse Analytics.ipynb 1095 ConfiguringNotebookEnvironment.ipynb 1102 Credential Scan on Azure Blob Storage.ipynb 589 Credential Scan on Azure Data Explorer.ipynb 579 Credential Scan on Azure Log Analytics.ipynb 474 Entity Explorer - Account.ipynb 2678 Entity Explorer - Domain and URL.ipynb 568 Entity Explorer - Host.ipynb 804 Entity Explorer - IP Address.ipynb 2005 Entity Explorer - Linux Host.ipynb 808 Entity Explorer - Windows Host.ipynb 808 Guided Hunting - Anomalous Office365 Exchange Sessions.ipynb 596 Guided Hunting - Azure Resource Explorer.ipynb 1363 Guided Hunting - Base64-Encoded Linux Commands.ipynb 1140 Guided Hunting - Detect potential network beaconing using Apache Spark via Azure Synapse.ipynb 1469 Guided Hunting - Investigating Malicious Links Shared in Teams.ipynb 526 Guided Investigation - Azure WAF SQLI.ipynb 989 Guided Investigation - Fusion Incident.ipynb 1755 Guided Investigation - Incident Triage.ipynb 1461 Hands-on 1. Data Discovery using Azure REST API.ipynb 441 Hands-on 2. Surfing Data using Azure SDK.ipynb 346 Machine Learning in Notebooks Examples.ipynb 1575 Sentinel Bulk Logs Export.ipynb 498 msticpyconfig.yaml 5