Yes, we're using Microsoft Sentinel, but the underlying threat detection theory, logic and threat hunting approach is transferable into your own environments, whatever your preferred platform.We look at the top 10+ methods we use in offensive engagements and show how these can be caught, along ...