Analytic Rules
Automation
Watchlists
Workbooks
Reports
Hunting-Rules
Existing log sources
or new third party log sources (i.e. non-Microsoft)
zScaler Internet Access:
Add a URL to a Category (typically to block it)
Palo Alto PAN OS:
Block (or unblock) an IP via an Address Group.
Cisco Meraki:
Block a potentially malicious client by a client policy