You need to configure the detection of multi staged attacks to meet the monitoring requirements.
What should you do?
You need to configure the detection of multi-staged attacks to meet the monitoring requirements.
What should you do?
You create a Log Analytics workspace.
You need to implement the technical requirements for auditing.
What should you configure in Azure AD?
You need to meet the authentication requirements for leaked credentials.
What should you do?