20 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (874:893, 2%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (618:637, 2%) 18 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:657, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (181:198, <1%) 18 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:601, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (181:198, <1%) 18 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (874:891, 1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (409:426, 3%) 18 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:657, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (79:96, <1%) 18 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:601, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (79:96, <1%) 16 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:655, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (162:177, <1%) 16 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:655, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (213:228, <1%) 16 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:599, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (162:177, <1%) 16 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:599, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (213:228, <1%) 16 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (697:712, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1765:1780, <1%) 15 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (893:907, 1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (333:347, 4%) 15 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (877:891, 1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (862:876, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (191:204, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (152:165, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (127:140, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (296:309, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (232:245, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (258:271, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (333:346, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (402:415, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (915:928, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (359:372, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (485:498, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (586:599, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (651:664, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (305:318, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (221:234, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (244:257, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (274:287, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (404:417, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (341:354, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (185:198, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (121:134, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (146:159, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (507:520, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (551:564, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (626:639, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (697:710, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (661:674, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (373:386, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (444:457, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (232:245, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (979:992, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (944:957, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (736:749, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (771:784, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (870:883, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (848:861, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (811:824, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (909:922, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (402:415, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (296:309, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (258:271, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (232:245, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (333:346, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (152:165, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (191:204, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (127:140, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (341:354, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (305:318, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (404:417, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (146:159, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (121:134, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (185:198, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (221:234, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (274:287, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (244:257, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (296:309, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (258:271, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (232:245, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (333:346, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (191:204, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (152:165, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (127:140, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (402:415, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (909:922, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (870:883, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (848:861, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (944:957, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (979:992, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (444:457, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (551:564, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (507:520, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (697:710, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (626:639, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (661:674, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (811:824, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (771:784, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (736:749, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (232:245, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (373:386, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1133:1146, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1156:1169, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1178:1191, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1201:1214, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1223:1236, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1245:1258, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1285:1298, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1014:1027, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1036:1049, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1095:1108, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1585:1598, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1611:1624, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1646:1659, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1669:1682, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1691:1704, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1717:1730, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1308:1321, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1330:1343, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1352:1365, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1408:1421, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1430:1443, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1452:1465, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1475:1488, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1498:1511, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1520:1533, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1543:1556, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (232:245, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (373:386, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (661:674, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (697:710, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (626:639, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (771:784, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (736:749, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (444:457, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (551:564, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (507:520, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (811:824, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (848:861, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (870:883, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (909:922, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (944:957, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (979:992, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1520:1533, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1498:1511, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1475:1488, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1452:1465, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1430:1443, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1408:1421, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (915:928, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1352:1365, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1330:1343, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1308:1321, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1285:1298, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1245:1258, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1223:1236, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1201:1214, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1178:1191, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1156:1169, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1133:1146, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1095:1108, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1036:1049, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1014:1027, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (359:372, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (485:498, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (651:664, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (586:599, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1717:1730, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1691:1704, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1669:1682, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1646:1659, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1611:1624, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1585:1598, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1543:1556, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (305:318, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (341:354, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (274:287, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (404:417, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (146:159, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (121:134, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (221:234, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (244:257, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (185:198, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (127:140, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (152:165, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (191:204, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (232:245, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (258:271, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (296:309, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (333:346, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (402:415, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1014:1027, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1095:1108, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1036:1049, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1133:1146, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1156:1169, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1178:1191, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1223:1236, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1245:1258, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1201:1214, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1285:1298, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1352:1365, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1308:1321, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1330:1343, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1475:1488, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1498:1511, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1430:1443, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1452:1465, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1408:1421, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1585:1598, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1543:1556, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1520:1533, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1669:1682, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1691:1704, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1646:1659, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1611:1624, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1717:1730, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (979:992, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (909:922, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (944:957, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (870:883, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (848:861, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (811:824, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (771:784, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (736:749, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (697:710, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (626:639, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (661:674, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (507:520, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (551:564, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (444:457, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (373:386, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (232:245, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1133:1146, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1178:1191, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1156:1169, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1095:1108, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1014:1027, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1036:1049, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1352:1365, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1308:1321, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1330:1343, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1245:1258, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1285:1298, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1223:1236, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1201:1214, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1611:1624, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1543:1556, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1520:1533, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1585:1598, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1498:1511, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1475:1488, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1408:1421, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1452:1465, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1430:1443, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1717:1730, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1669:1682, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1646:1659, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:523, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1691:1704, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (79:92, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (359:372, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (485:498, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (915:928, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (586:599, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (651:664, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (213:226, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (181:194, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (162:175, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (404:417, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1717:1730, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1691:1704, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1669:1682, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (274:287, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (305:318, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (341:354, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1611:1624, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1646:1659, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1585:1598, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1543:1556, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (146:159, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (185:198, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (221:234, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (244:257, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1520:1533, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1452:1465, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1475:1488, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1430:1443, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1498:1511, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (121:134, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1408:1421, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1330:1343, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1352:1365, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1308:1321, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1223:1236, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1245:1258, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1201:1214, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1285:1298, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1178:1191, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1133:1146, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1156:1169, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1095:1108, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1014:1027, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1036:1049, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (359:372, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (651:664, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (586:599, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (485:498, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (915:928, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (274:287, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (244:257, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (221:234, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (305:318, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (341:354, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (146:159, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (185:198, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (121:134, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (404:417, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (915:928, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (651:664, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (586:599, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (485:498, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (359:372, 1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (127:140, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (191:204, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (152:165, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (232:245, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (296:309, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (258:271, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (367:380, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (333:346, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:139, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (402:415, 3%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (771:784, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (736:749, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (848:861, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (870:883, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (811:824, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (551:564, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (507:520, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (697:710, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (661:674, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (626:639, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (979:992, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (944:957, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (909:922, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (373:386, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (444:457, <1%) 14 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:284, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (232:245, <1%) 13 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (893:905, 1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (443:455, 2%) 13 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (893:905, 1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1804:1816, <1%) 13 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (585:597, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1765:1777, <1%) 13 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (893:905, 1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1064:1076, 1%) 13 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (641:653, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1765:1777, <1%) 13 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (893:905, 1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (441:453, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:768, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (737:748, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (737:748, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:718, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:718, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (373:384, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (507:518, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (551:562, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (444:455, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (232:243, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:201, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (79:90, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (185:196, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (121:132, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (146:157, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (244:255, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (221:232, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (274:285, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (305:316, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (367:378, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (341:352, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (404:415, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1014:1025, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1036:1047, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1095:1106, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1245:1256, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1201:1212, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1223:1234, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1285:1296, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1133:1144, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1156:1167, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1178:1189, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1498:1509, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1452:1463, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1475:1486, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1408:1419, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1430:1441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1330:1341, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1352:1363, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1308:1319, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1691:1702, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1646:1657, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1669:1680, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1611:1622, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1585:1596, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1520:1531, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1543:1554, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1717:1728, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:680, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (915:926, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (586:597, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (651:662, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (373:384, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (444:455, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (626:637, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (359:370, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (697:708, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (661:672, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (507:518, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (485:496, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (551:562, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (232:243, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (561:572, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (848:859, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (870:881, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (811:822, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:335, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (736:747, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (771:782, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (909:920, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (979:990, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (944:955, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (561:572, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (485:496, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (586:597, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:335, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (359:370, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:201, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (181:192, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:201, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (162:173, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (915:926, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:201, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (213:224, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (651:662, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (811:822, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (848:859, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (870:881, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (909:920, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (944:955, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (979:990, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (626:637, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (661:672, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (736:747, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (771:782, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (697:708, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1389, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1069, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (127:138, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (402:413, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (296:307, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (333:344, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (367:378, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (152:163, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (191:202, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (232:243, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (258:269, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:299, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:803, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:803, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:299, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:50, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:43, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:50, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:718, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:241, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (162:173, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:241, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (181:192, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:241, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (213:224, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:544, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:37, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:521, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (213:224, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (507:518, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:521, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (162:173, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:521, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (181:192, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:538, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (507:518, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (359:370, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (586:597, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (485:496, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (687:698, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (687:698, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (152:163, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (127:138, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (191:202, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (258:269, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (232:243, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (296:307, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (367:378, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (333:344, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (402:413, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (651:662, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (915:926, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:680, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:680, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:591, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (146:157, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (121:132, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (221:232, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (274:285, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (244:255, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (185:196, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (341:352, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (367:378, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (305:316, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (404:415, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:591, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:591, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (364:375, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (364:375, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:803, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:299, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:137, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (213:224, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:137, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (181:192, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:137, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (162:173, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:633, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:282, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (79:90, <1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:633, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:43, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1069, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1389, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:241, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (79:90, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:633, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:335, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (708:719, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (417:428, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1498:1509, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1475:1486, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1452:1463, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1430:1441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1408:1419, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1352:1363, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1330:1341, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1308:1319, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1285:1296, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1245:1256, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1223:1234, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1201:1212, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1178:1189, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1156:1167, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1133:1144, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1095:1106, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1036:1047, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1014:1025, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1717:1728, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1691:1702, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1669:1680, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1646:1657, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1611:1622, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1585:1596, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1543:1554, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:595, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1520:1531, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (979:990, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (909:920, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (944:955, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (848:859, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (870:881, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (811:822, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (736:747, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (771:782, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (626:637, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (661:672, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (697:708, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (507:518, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (551:562, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (444:455, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (373:384, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (232:243, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (598:609, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (598:609, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:521, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (79:90, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:338, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:179, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:218, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:768, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:768, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (649:660, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (649:660, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:32, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:39, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:137, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (79:90, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:50, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1014:1025, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1036:1047, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1133:1144, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1178:1189, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1156:1167, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1095:1106, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1408:1419, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1452:1463, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1430:1441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1498:1509, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1475:1486, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1520:1531, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1543:1554, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1585:1596, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1201:1212, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1245:1256, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1223:1234, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1285:1296, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1330:1341, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1308:1319, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1352:1363, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1646:1657, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1691:1702, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1669:1680, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1611:1622, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1717:1728, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:544, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:39, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:400, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (185:196, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (221:232, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (244:255, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (274:285, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (121:132, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (146:157, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:32, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:37, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (404:415, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (341:352, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (367:378, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:707, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (305:316, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (305:316, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (305:316, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:907, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:844, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:806, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:769, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:734, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:694, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:659, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:620, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:586, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:549, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:942, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:977, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:504, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:441, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:351, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:211, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1576, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1644, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:185, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:224, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:282, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (181:192, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:282, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (162:173, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:282, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (213:224, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1012, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1091, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1130, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1280, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1404, <1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:52, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:913, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:976, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:719, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:760, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:584, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:649, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:357, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:479, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:423, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:853, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:853, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:234, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:275, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:56, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (269:280, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (773:784, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (269:280, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (548:559, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (773:784, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (130:141, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:400, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1019, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:853, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (44:55, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (232:243, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (258:269, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (296:307, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (367:378, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (333:344, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (127:138, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (152:163, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (191:202, 2%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:28, 3%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:538, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 12 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:651, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (402:413, 2%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:538, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (499:510, 1%) 12 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:400, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (116:127, 1%) 11 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (881:891, 1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (967:977, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (448:458, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (330:340, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (400:410, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (211:221, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (272:282, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1765:1775, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (191:201, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1765:1775, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:105, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:304, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:605, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (231:241, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1765:1775, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (511:521, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1765:1775, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:567, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:263, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (448:458, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (400:410, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (211:221, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (330:340, 1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (127:137, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1765:1775, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:623, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:605, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:222, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:159, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:50, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 11 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:679, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1763, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:104, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (36:45, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (68:77, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:678, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:221, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:303, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:657, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (1536:1545, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (338:347, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:49, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:303, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:303, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (30:39, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (30:39, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:605, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:198, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1278, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1402, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1010, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1089, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1128, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1642, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1762, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:104, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1574, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:262, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (36:45, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (68:77, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1017, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1060:1069, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1380:1389, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (269:278, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (113:122, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (246:255, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (222:231, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (164:173, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (138:147, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (192:201, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:622, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (731:740, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (778:787, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (682:691, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (620:629, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (554:563, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (946:955, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (990:999, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (849:858, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (814:823, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (884:893, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (192:201, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (164:173, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (138:147, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (113:122, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (269:278, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (246:255, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (222:231, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:104, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:104, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:54, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:221, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:303, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:303, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:48, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:975, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:940, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:584, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:547, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:692, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:657, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:618, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:804, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:767, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:732, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:905, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:842, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:209, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:349, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:502, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:439, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1029:1038, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:96, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:566, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1029:1038, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:158, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (129:138, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (104:113, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (182:191, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (156:165, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (248:257, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (210:219, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (298:307, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (274:283, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:158, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:26, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:49, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:158, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:717, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:758, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:647, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:974, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:911, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:355, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (30:39, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:232, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:273, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:582, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:96, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:421, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:477, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:221, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (965:974, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (902:911, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (573:582, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (638:647, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (708:717, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (749:758, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (346:355, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (412:421, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (468:477, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (264:273, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (223:232, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:49, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (30:39, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (17:26, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:566, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:566, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:601, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:104, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (893:902, 1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (979:988, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (34:43, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (129:138, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (156:165, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (104:113, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:262, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:262, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (182:191, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (248:257, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (274:283, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (210:219, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (36:45, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (68:77, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (298:307, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1029:1038, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (41:50, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:622, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:678, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (41:50, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (682:691, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (731:740, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (778:787, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (884:893, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (849:858, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (814:823, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (554:563, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (620:629, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (990:999, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (946:955, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1565:1574, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1380:1389, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1633:1642, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (45:54, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1753:1762, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1060:1069, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1080:1089, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (269:278, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (222:231, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (246:255, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1119:1128, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (138:147, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (164:173, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (113:122, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (275:284, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (192:201, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1269:1278, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1393:1402, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:262, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:262, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1001:1010, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:158, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (30:39, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:678, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:216, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:177, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:336, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (68:77, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (36:45, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:622, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:622, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (248:257, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (210:219, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (156:165, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (182:191, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (274:283, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (298:307, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (129:138, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (104:113, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:49, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:622, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:221, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:221, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (182:191, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (274:283, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (248:257, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (210:219, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (156:165, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (129:138, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (104:113, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:566, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (298:307, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1008:1017, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (833:842, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (896:905, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (931:940, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (966:975, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (609:618, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (683:692, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (648:657, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (575:584, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (758:767, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (723:732, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (795:804, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (430:439, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (340:349, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (538:547, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (493:502, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (200:209, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (990:999, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (946:955, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (778:787, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (731:740, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (884:893, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (814:823, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (849:858, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (554:563, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (620:629, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (682:691, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (721:730, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (325:334, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (274:283, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (298:307, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (210:219, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (248:257, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (156:165, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (182:191, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (104:113, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (129:138, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:605, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:198, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (294:303, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (613:622, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:221, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:410, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:340, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:458, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (946:955, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (990:999, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (814:823, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (849:858, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (884:893, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (731:740, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (778:787, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (620:629, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (682:691, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (130:139, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (554:563, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (194:203, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1029:1038, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:158, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (149:158, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:340, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:221, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:410, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:458, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:50, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (34:43, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (212:221, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:678, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (26:35, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:657, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (30:39, 2%) 10 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (3:12, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (550:559, 1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:49, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (40:49, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (3:12, 1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (132:141, 1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (41:50, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:536, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:302, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:195, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (721:730, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1056:1065, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (39:48, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (778:787, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (731:740, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (620:629, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (682:691, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (554:563, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (246:255, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (222:231, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (269:278, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (113:122, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (192:201, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (164:173, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (138:147, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:601, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (30:39, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (990:999, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (946:955, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (814:823, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (884:893, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (514:523, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (849:858, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:566, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:183, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (21:30, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:222, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:678, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1058:1067, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (557:566, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (28:37, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (669:678, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1378:1387, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (95:104, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (39:48, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1029:1038, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (36:45, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (68:77, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (113:122, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (192:201, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (164:173, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (138:147, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (213:222, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (222:231, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (269:278, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (174:183, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (234:243, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (246:255, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (253:262, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (32:41, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:94, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:179, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:230, <1%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (168:177, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (207:216, 2%) 10 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (533:542, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (327:336, 2%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:677, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:677, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:677, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:677, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:677, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:677, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:677, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (185:193, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:296, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (526:534, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (292:300, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:800, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (721:729, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (294:302, 2%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (84:92, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:630, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:630, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:630, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:630, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:630, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:630, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:630, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:535, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:535, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:535, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:535, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:535, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:535, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:535, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (622:630, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:765, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:765, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:765, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:765, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:765, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:765, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:765, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (721:729, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (432:440, 1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:850, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (669:677, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (84:92, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:715, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:715, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:715, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:715, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:715, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:715, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:715, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:588, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:296, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:296, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:296, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:296, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:296, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:296, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (288:296, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (526:534, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (292:300, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (185:193, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:332, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:332, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:332, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:332, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:332, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:332, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (527:535, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:332, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (721:729, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1792:1800, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:800, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:800, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:800, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:800, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:800, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:800, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (792:800, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (721:729, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (430:438, 1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:397, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:397, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:397, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:397, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:397, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:397, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:397, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (389:397, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (707:715, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:588, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:588, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:588, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:588, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:588, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:588, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (580:588, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (324:332, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (757:765, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (81:89, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:850, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (182:190, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:850, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (289:297, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:850, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (208:216, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:850, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (397:405, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:850, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (327:335, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:850, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (445:453, <1%) 9 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (842:850, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (523:531, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:104, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (329:336, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (170:177, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (209:216, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:104, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:104, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:104, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:104, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (41:48, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:622, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:622, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:622, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:622, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (176:183, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (215:222, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:262, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:262, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:303, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:303, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:303, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:303, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (1536:1543, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1069:1076, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:228, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:542, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1010:1017, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:303, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1755:1762, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (210:217, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (182:189, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1003:1010, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (156:163, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (104:111, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1082:1089, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (129:136, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (274:281, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (298:305, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (248:255, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1271:1278, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1121:1128, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1395:1402, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1635:1642, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1567:1574, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (554:561, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (682:689, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (620:627, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (731:738, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (778:785, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (814:821, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (849:856, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (884:891, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (946:953, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (990:997, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:49, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:49, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (36:43, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (68:75, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:92, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:262, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:158, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:49, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:49, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:49, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (1536:1543, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1809:1816, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:49, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (170:177, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (209:216, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (329:336, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:566, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:566, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:566, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:566, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (575:582, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (640:647, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (348:355, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (266:273, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (470:477, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (414:421, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (225:232, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (967:974, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (904:911, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (751:758, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (710:717, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:221, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (1536:1543, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (448:455, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (30:37, 2%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (1536:1543, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (446:453, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (19:26, 2%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:678, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:678, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:678, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:678, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:221, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (41:48, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:221, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:262, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:262, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:262, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:262, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1029:1036, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (19:26, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (47:54, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (192:199, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (164:171, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (138:145, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (113:120, 2%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (269:276, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (246:253, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (222:229, 2%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (898:905, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (835:842, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (968:975, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (933:940, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (577:584, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (685:692, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (650:657, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (611:618, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (797:804, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (760:767, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (725:732, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (164:171, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (192:199, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (138:145, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (342:349, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (432:439, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (222:229, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (495:502, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (246:253, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (269:276, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (540:547, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (202:209, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (113:120, 2%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:71, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (298:305, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (274:281, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (248:255, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (210:217, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (36:43, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (182:189, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (156:163, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (129:136, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (104:111, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (68:75, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:104, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:104, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1395:1402, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1271:1278, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1121:1128, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1082:1089, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1003:1010, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1755:1762, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1635:1642, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1567:1574, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (30:37, 2%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (164:171, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (192:199, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (113:120, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (138:145, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (246:253, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (269:276, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (222:229, 2%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:208, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:158, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:158, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:158, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:158, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:303, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:303, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:566, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:566, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:622, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:622, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:49, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (802:809, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (551:558, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (568:575, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (541:548, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (518:525, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (508:515, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (778:785, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (498:505, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (731:738, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (488:495, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (464:471, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (884:891, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (849:856, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (381:388, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (354:361, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (364:371, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (814:821, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (334:341, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (776:783, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (758:765, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (733:740, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (554:561, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (694:701, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (672:679, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (634:641, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (682:689, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (620:627, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (599:606, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (306:313, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (990:997, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (265:272, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (235:242, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (946:953, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (125:132, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1029:1036, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (414:421, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (470:477, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (575:582, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (225:232, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (266:273, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (348:355, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (170:177, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:30, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (221:228, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:622, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:300, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:534, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:132, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:193, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (293:300, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (527:534, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:542, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (186:193, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (47:54, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (904:911, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (967:974, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (710:717, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (640:647, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (751:758, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (43:50, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:221, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (449:456, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:221, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (401:408, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:221, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (331:338, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:221, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (212:219, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:256, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:109, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1010:1017, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (202:209, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (92:99, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:153, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (71:78, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:867, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (592:599, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (43:50, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:678, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (176:183, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (215:222, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:678, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (685:692, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (298:305, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (248:255, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (274:281, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (210:217, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (611:618, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (650:657, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (577:584, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (540:547, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (432:439, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (495:502, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (342:349, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (182:189, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (129:136, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (156:163, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (104:111, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (933:940, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (968:975, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (835:842, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (898:905, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (797:804, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (725:732, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (648:655, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (760:767, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (68:75, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (700:707, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (36:43, 2%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:678, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:30, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (85:92, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (946:953, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (990:997, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (849:856, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (814:821, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (884:891, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (778:785, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (731:738, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (682:689, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (620:627, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (554:561, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:566, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (87:94, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:99, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (338:345, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (395:402, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (352:359, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (379:386, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:89, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (369:376, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (588:595, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1029:1036, <1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (579:586, 1%) 8 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:217, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (592:599, 1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:158, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (596:603, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:158, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (189:196, <1%) 8 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (644:651, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (30:37, 2%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (102:108, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (82:88, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:756, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:371, 1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (249:255, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:621, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:371, 1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (292:298, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (211:217, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (185:191, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (400:406, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (448:454, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (330:336, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (526:532, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:526, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:371, 1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:388, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:371, 1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (125:131, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (713:719, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (286:292, 1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:706, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:371, 1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (860:866, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (713:719, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1048:1054, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (92:98, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (201:207, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:601, <1%) 7 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (84:90, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (210:216, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (871:877, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1042:1048, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:668, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:371, 1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (64:70, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 7 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (146:152, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (948:954, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (795:800, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (795:800, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (795:800, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (795:800, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1384:1389, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (296:301, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1064:1069, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (845:850, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (845:850, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (845:850, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (47:52, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (845:850, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (32:37, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (22:27, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (1538:1543, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (347:352, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1064:1069, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (22:27, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (45:50, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (91:96, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1384:1389, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:370, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (710:715, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (38:43, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (708:713, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (419:424, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (91:96, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (45:50, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (193:198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (600:605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:652, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (47:52, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:370, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (795:800, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (453:458, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (583:588, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (335:340, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (254:259, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (254:259, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (327:332, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (393:398, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (710:715, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (274:279, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (531:536, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (734:739, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (335:340, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (531:536, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (369:374, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (584:589, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (588:593, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (91:96, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (45:50, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (559:564, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (393:398, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (190:195, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (588:593, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (453:458, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (335:340, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (600:605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (710:715, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (710:715, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (710:715, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (193:198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (710:715, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (640:645, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (588:593, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (34:39, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1064:1069, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1384:1389, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (692:697, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (45:50, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (91:96, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (291:296, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (310:315, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (255:260, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (795:800, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (711:716, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (711:716, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (327:332, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (760:765, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (614:619, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (614:619, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (603:608, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (603:608, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (583:588, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (583:588, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (583:588, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (583:588, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (583:588, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (34:39, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (150:155, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (150:155, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (600:605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (193:198, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (654:659, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (654:659, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (151:156, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:370, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (760:765, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (600:605, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (535:540, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (193:198, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (230:235, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (588:593, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (318:323, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (530:535, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (530:535, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (750:755, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (530:535, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (530:535, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (510:515, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (588:593, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (615:620, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:652, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (502:507, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (647:652, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (119:124, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (369:374, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (41:46, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (41:46, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (369:374, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (335:340, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (453:458, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (760:765, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (760:765, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (760:765, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (760:765, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (213:218, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (213:218, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (41:46, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (310:315, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (310:315, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (392:397, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (392:397, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (392:397, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (392:397, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (214:219, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (292:297, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (292:297, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (38:43, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (671:676, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (786:791, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:370, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (672:677, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (672:677, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (672:677, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:596, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (502:507, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (672:677, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (846:851, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (846:851, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:596, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (119:124, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (520:525, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (335:340, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (453:458, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (530:535, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (32:37, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (282:287, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (34:39, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (274:279, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (274:279, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (591:596, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (47:52, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (34:39, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (38:43, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (6:11, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (734:739, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1806:1811, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (534:539, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (534:539, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (42:47, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (845:850, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (32:37, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (700:705, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (327:332, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (327:332, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (327:332, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (327:332, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (266:271, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (225:230, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (414:419, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (470:475, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (38:43, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (126:131, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (588:593, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (348:353, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (734:739, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (981:986, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (710:715, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (640:645, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (575:580, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (904:909, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (392:397, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (27:32, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (742:747, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (38:43, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (742:747, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (574:579, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (365:370, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (673:678, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (596:601, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (673:678, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (392:397, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (734:739, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (445:450, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (328:333, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (328:333, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (209:214, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (170:175, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (329:334, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (28:33, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (615:620, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (558:563, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (558:563, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (43:48, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (30:35, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (291:296, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (672:677, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (45:50, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (836:841, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (91:96, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (696:701, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (588:593, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (672:677, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (625:630, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (210:215, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (742:747, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (176:181, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (215:220, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (539:544, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (273:278, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (796:801, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (796:801, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (654:659, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (335:340, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (453:458, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (300:305, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (900:905, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (347:352, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (38:43, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1384:1389, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1064:1069, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1271:1276, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1121:1126, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1380:1385, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1395:1400, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1635:1640, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1567:1572, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (335:340, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (405:410, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (453:458, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1755:1760, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1060:1065, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1082:1087, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1003:1008, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (295:300, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (295:300, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (670:675, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1009:1014, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (566:571, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (670:675, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (778:783, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (675:680, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (778:783, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (845:850, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (32:37, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (214:219, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (320:325, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (112:117, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (200:205, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (161:166, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (34:39, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (382:387, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (69:74, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (84:89, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (777:782, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (19:24, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (512:517, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (512:517, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (778:783, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (96:101, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (134:139, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (625:630, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (625:630, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (625:630, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (625:630, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (27:32, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (96:101, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (552:557, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (29:34, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (42:47, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (627:632, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (663:668, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (655:660, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (687:692, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (721:726, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (711:716, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (795:800, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (837:842, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (525:530, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1001:1006, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (600:605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (206:211, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (193:198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (216:221, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (242:247, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (489:494, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (258:263, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (285:290, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (276:281, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (299:304, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (228:233, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (398:403, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (327:332, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (346:351, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (442:447, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (450:455, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (476:481, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (528:533, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (561:566, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (589:594, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (578:583, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (106:111, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (143:148, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (187:192, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (662:667, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (147:152, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (734:739, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (443:448, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (162:167, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (190:195, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (101:106, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (137:142, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (112:117, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (685:690, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (650:655, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (611:616, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (797:802, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (760:765, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (725:730, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (898:903, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (835:840, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (968:973, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (933:938, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (202:207, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (342:347, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (495:500, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (432:437, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (577:582, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (540:545, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (786:791, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (712:717, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (751:756, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (32:37, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (641:646, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (676:681, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (600:605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (959:964, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (994:999, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (924:929, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (530:535, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (86:91, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (826:831, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (388:393, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (294:299, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (247:252, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (269:274, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (692:697, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (193:198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (522:527, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (566:571, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (459:464, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (180:185, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (354:359, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (161:166, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (472:477, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (482:487, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (572:577, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (704:709, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1010:1015, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (256:261, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (692:697, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:708, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (502:507, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (565:570, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (141:146, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (34:39, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:708, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (119:124, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1216:1221, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1238:1243, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1171:1176, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1193:1198, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1148:1153, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1029:1034, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1445:1450, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1467:1472, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1490:1495, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1423:1428, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1323:1328, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1345:1350, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (584:589, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1300:1305, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1684:1689, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1600:1605, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1661:1666, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1513:1518, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1535:1540, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (41:46, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (60:65, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1706:1711, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (584:589, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (42:47, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (512:517, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (761:766, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (23:28, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (761:766, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (703:708, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (47:52, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (691:696, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (603:608, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (48:53, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (6:11, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (6:11, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (601:606, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (666:671, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (789:794, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (734:739, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (1066:1071, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (500:505, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (374:379, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (34:39, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (220:225, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (20:25, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (368:373, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (309:314, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (273:278, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (247:252, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (142:147, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (348:353, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (311:316, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (271:276, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (588:593, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (825:830, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (860:865, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (619:624, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (930:935, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (742:747, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (291:296, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (220:225, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (631:636, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (693:698, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (291:296, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (169:174, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (291:296, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (188:193, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (957:962, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (652:657, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (895:900, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (291:296, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (595:600, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (33:38, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (46:51, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (305:310, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (229:234, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (388:393, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (85:90, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (159:164, <1%) - tutorials-and-examples/deprecated-notebooks/A Getting Started Guide For Azure Sentinel Notebooks.ipynb (26:31, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (224:229, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (265:270, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (347:352, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (469:474, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (413:418, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (574:579, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (639:644, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (750:755, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (709:714, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (903:908, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/how-tos/Configurate Azure ML and Azure Synapse Analytics.ipynb (966:971, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (5:10, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (40:45, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (45:50, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (91:96, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1064:1069, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1384:1389, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (245:250, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (236:241, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (289:294, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (356:361, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (382:387, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1120:1125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1002:1007, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1081:1086, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1059:1064, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (218:223, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (103:108, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (229:234, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (97:102, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1772:1777, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (304:309, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1754:1759, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1634:1639, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (525:530, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (566:571, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (120:125, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (741:746, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (769:774, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1394:1399, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1379:1384, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (836:841, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (73:78, <1%) - tutorials-and-examples/how-tos/TroubleShootingNotebooks.ipynb (885:890, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1270:1275, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (188:193, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1566:1571, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (566:571, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (503:508, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (741:746, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (18:23, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (328:333, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (653:658, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (49:54, <1%) - tutorials-and-examples/how-tos/Notebook Template.ipynb (35:40, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (208:213, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (511:516, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (169:174, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (563:568, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (136:141, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (40:45, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (602:607, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (27:32, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (155:160, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (863:868, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (684:689, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (796:801, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (724:729, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (759:764, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (576:581, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (649:654, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (610:615, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (494:499, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (539:544, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (341:346, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (431:436, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (201:206, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Compute Cluster and Managed Identity.ipynb (75:80, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (286:291, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (32:37, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (625:630, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1771:1776, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (155:160, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (149:154, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (175:180, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1626:1631, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1558:1563, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (124:129, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1732:1737, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (233:238, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (257:262, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Hunting Bookmarks.ipynb (203:208, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (115:120, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (167:172, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (140:145, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (932:937, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (193:198, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (967:972, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (259:264, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (221:226, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (101:106, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (285:290, 1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (834:839, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (565:570, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (897:902, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1110:1115, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1260:1265, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (259:264, <1%) - tutorials-and-examples/how-tos/Automation Setup - Configure Azure Machine Learning Pipelines.ipynb (81:86, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1367:1372, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1384:1389, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (47:52, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (46:51, <1%) - tutorials-and-examples/how-tos/Adding Secrets to Azure Key Vault.ipynb (79:84, 1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1064:1069, <1%) 6 duplicated lines in: - machine-learning-notebooks/Guided Hunting - Anomalous Process Network Connections.ipynb (205:210, <1%) - tutorials-and-examples/training-notebooks/Training - MSTICPy Training 1221.ipynb (1051:1056, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (626:631, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (553:558, <1%) 6 duplicated lines in: - machine-learning-notebooks/MasqueradingProcessNameAnomaly.ipynb (626:631, <1%) - tutorials-and-examples/example-notebooks/SigmaRuleImporter.ipynb (135:140, <1%)