Azure Sentinel Threat Automation
Try These Prompts
Click on an example to start a conversation:
- ๐ Search the web for the latest fileless malware, extract the known IOCs, and create a KQL Analytical Rule to detect each.
- ๐ฐ Search for the latest cybersecurity news articles and provide KQL queries to detect the known IOCs mentioned in those articles.
- ๐ก๏ธ Provide KQL queries to detect early indicators of ransomware attacks based on the latest techniques and behaviours observed in current ransomware threats.
- ๐ง Investigate recent updates on phishing-as-a-service, extract their IOCs, and create KQL queries to detect phishing attempts within the network.
- ๐พSearch for the most recent CVEs, extract the associated Indicators of Compromise (IOCs), and create KQL queries to detect these threats using known tactics and techniques
Other AI models
Try out these other AI models to see if they work better for you
Defender XDR Threat Automation
Advanced co-pilot tool for real-time cyber news and threat intelligence. Identifies new threats, extracts IOCs, and crafts incident response and KQL advanced hunting and analytical rules to detect and mitigate emerging threats effectively with advanced KQL expertise.
Transilience Threat Research Expert
Cyber threat intelligence specialist providing insights and specific IOCs (powered by www.transilience.ai)
Cyber Threat Planner
Detailed analyst and planner of cyber threats.
Cyber Threat Intel Analyst
Cyber Threat Intel Analyst focusing on APTs and IOCs.
Threat Hunter
Assists threat hunters in analyzing data and identifying potential security threats.
Special Offers & Rewards
๐ Refer & Earn!
Earn up to 100 ๐! Refer friends, write reviews / blog articles, or simply login daily to earn gems.
Earn Gems Now