Ansible for Falcon LogScale
Log and analyze Ansible playbook data in Falcon LogScale
Gain valuable email security insights from Microsoft 365 logs in CrowdStrike Falcon® LogScale. Easily ingest, store, analyze, and visualize your email security event data alongside other data sources in Falcon LogScale. Leverage a pre-built email security event dashboard, threat summary, and indicator of compromise (IOC) email log scanning within Falcon LogScale to improve threat detection and response with unified security insights.
Easily ingest and parse Microsoft 365 events, streaming them with Microsoft 365 Defender to Azure Event Hubs before they are shipped to Falcon LogScale, for comprehensive visibility of your environment.
Leverage an email overview dashboard with details such as email security events and flow volumes. You can also easily view delivery status, recipients, URL details, and forwarding rules through Falcon LogScale.
Access an email threat summary to quickly identify threats found in Microsoft 365 Defender, including volume and threat type. You can also rapidly scan for, detect, and drill down into IOCs across email logs to speed up investigations.