# Support Sentinel Queries
The resources listed below are linked directly to the official Sentinel repo. The manuals are brief and to the point query, data connectors, and some additional information on the execution of Sentinel with the required integrations.
# Microsoft 365
- [Hunting Queries/OfficeActivity](https://github.com/Azure/Azure-Sentinel/tree/master/Hunting%20Queries/OfficeActivity)
- [Detections/OfficeActivity](https://github.com/Azure/Azure-Sentinel/tree/master/Detections/OfficeActivity)
### Sharepoint
- [Suspect access and download from inside or outside organisation, …](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Trend%20Micro%20Cloud%20App%20Security/Hunting%20Queries/TrendMicroCASSuspiciousFilesSharepoint.yaml)
- [Microsoft SharePoint ASIM FileEvent Normalization Parser
](https://github.com/Azure/Azure-Sentinel/tree/master/Parsers/ASimFileEvent/ARM/FileEventMicrosoftSharePoint)
### [Sentinel Solution: Teams](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Teams)
[Turn Auditing ON](https://learn.microsoft.com/en-us/microsoft-365/compliance/turn-audit-log-search-on-or-off?view=o365-worldwide)
---
# Azure
### [Sentinel Solution: Azure SQL managed instance](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Azure%20SQL%20Database)
- Suspect access, activity overload from a user, (2 databases)
### [Sentinel Solution: Dynamics 365 sales enterprise edition](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Dynamics%20365)
- Access to admin console, suspect database activity, …
### [Sentinel Solution: Azure Active Directory](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Azure%20Active%20Directory)
### Power Apps
- [Using Azure Log Analytics in Power BI](https://learn.microsoft.com/en-us/power-bi/transform-model/log-analytics/desktop-log-analytics-overview)
- [Deploy Function App for getting Office 365 Management API data into Azure Sentinel
](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/O365%20Data)