machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/how-tos/Notebook Template.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb