Question 1 of 1010%
Mitigate threats using Microsoft Sentineleasy

A security operations analyst is creating a scheduled analytics rule in Microsoft Sentinel to detect brute force attempts on Microsoft Entra ID authentication. Which data source is most appropriate for this rule?

Select one: