Best Practices for Views and Layers
Using Synapse to Investigate Suspected Credential Theft Activity
Using the Vertex-Threat-Intel Power-Up Workflow
Leveraging DNS Suffix Data for Threat Clustering
Analyzing Two of Russia's Military Intelligence Units with Synapse
Analyzing a Suspected Russian Influence Operation with Synapse
Using the Synapse-Twitter Power-Up to Ingest IOCs Shared via Twitter
Automating Power-Ups to Aid Data Ingest, Enrichment, and Analysis
Vertex Tag Tree Overview
Supercharge Your Analysis with Synapse Power-Ups
How I Learned the Storm Query Language
Preserving Analysts’ Sanity by Automating Sinkhole Monitoring
Importing Data Doesn’t have to be hard: Transferring Structured Data at Scale with Csvtool