Postingan

Menampilkan postingan dari Maret, 2022

Implement CI/CD with Azure DevOps

Gambar
  Introduction      Imagine you are part of a team of data engineers who are collaborating on one or more notebooks within a development environment, using Azure Databricks. When you are ready to deploy your changes to production, you must coordinate with an operations team to copy the notebooks over to a production Azure Databricks workspace since company policy dictates that you and your team are not allowed to manually copy the changed files over. This process causes bottlenecks and extra work. Leadership has asked you to find an automated process that incorporates version control, automated testing capabilities, and controls for deployment approvals if needed. Automated testing and deployment is a common practice in software development. However, those same principles also apply to data engineering and data science. Data engineers and data scientists need to collaborate on parts of the system and be able to deploy to production without constantly relying on opera...

Perform device investigations in Microsoft Defender for Endpoint

Gambar
       Introduction Microsoft Defender for Endpoint provides detailed device information, including forensics information.      You are a Security Operations Analyst working at a company that has implemented Microsoft Defender for Endpoint, and your primary job is to remediate incidents. You are assigned an incident with alerts related to a suspicious PowerShell command line. You start by reviewing the incident and understand all the related alerts, devices, and evidence. You open the alert page to review the Alert Story and decide to perform further analysis on the device.      You open the Device page to provide more context to the incident. The overview tab on the Device page immediately provides concerning information such as the Risk level and Exposure level. You select the Alerts tab to see a history of alerts for the device. Next, you choose the Timeline tab to see a list of events from the device. You see many suspicious events. ...