Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • AI
  • Privacy
  • Cryptocurrency
  • Blockchain
  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

Kusto Query Internals–Azure Sentinel Reference

by Huy Kha

in Document, Report
1 min read

This documentation is about Kusto Query Language (KQL) with a primary focus on targeting the Security Analysts audience. KQL can be used by Security Analysts to search for security events at a large scale, which makes it very useful to have a basic understanding of it.
Cloud & Security Administrators who manage Azure AD & Office365 can use this document as well to understand on how to search for different activities in their Cloud environment. We will cover a few examples such as finding activities in Azure AD, Exchange & SharePoint – Online.
The purpose of this documentation is to provide a basic understanding on how the structure of KQL works with ”hands-on” examples. It walks you through the different steps on searching and analyzing different datasets, and last, but not least. There is a homework section at the end of this document to make sure that you also practice it hands-on. There is nothing ”advanced” here, because the focus is on using common KQL operators in practice, and not the rare ones. That you might only use once a while.

DOWNLOAD REPORT

Tags: CybersecurityInformation Risk Insights StudyKQLKusto Query Language
14
VIEWS

More Reports

Assessing The Risk of Compromised Credentials to The Enterprise
Report

Assessing The Risk of Compromised Credentials to The Enterprise

April 19, 2021

Assessing The Risk of Compromised Credentials to The Enterprise: Businesses today face an abundance of organizational risk. These come in...

A Look into the Global “Drive-By Cryptocurency Mining” Phenomenon
Report

A Look into the Global “Drive-By Cryptocurency Mining” Phenomenon

April 16, 2021

Differing from traditional money, cryptocurrencies are not issued by a central bank or authority. Instead, this digital asset can be...

THE WHO, WHAT, WHY AND HOW OF DDoS ATTACKS: A GUIDE FOR IT PROS
Report

THE WHO, WHAT, WHY AND HOW OF DDoS ATTACKS: A GUIDE FOR IT PROS

April 15, 2021

The IT industry has seen a major increase of Distributed Denial of Service (DDoS) attacks over the past several years.

MORE

Quote

“HTTPS & SSL doesn’t mean “trust this.” It means “this is private.” You may be having a private conversation with Satan.”

January 8, 2021
APIs

Blogger REST API

December 29, 2020
Book

Book: Automate the Boring Stuff with Python

January 12, 2021
Course

COURSE: Introduction to Threat Intelligence and Attribution

February 2, 2021
ADVERTISEMENT

Tags

Books Cybersecurity Hackers Malware Memes Movies Quantum Computing Report Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • AI
    • Privacy
    • Cryptocurrency
    • Blockchain
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.