Plan and deploy Microsoft Advanced Threat Analytics the right way

Really it's very interesting video with a very clear explanation, I didn't finish it yet, but really you gave me very good and wide information not only about ATA but about the attack logic and how's the attacker's behaviors looks like.