Security through data

CONTENT

  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials

FEATURED

  • CyberAlerts
  • CyberDecoded
  • CyberWeekly
  • CyberStory
  • CyberTips

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
No Result
View All Result

Kusto Query Internals–Azure Sentinel Reference

by Huy Kha

in Documents, Reports
1 min read

This documentation is about Kusto Query Language (KQL) with a primary focus on targeting the Security Analysts audience. KQL can be used by Security Analysts to search for security events at a large scale, which makes it very useful to have a basic understanding of it.
Cloud & Security Administrators who manage Azure AD & Office365 can use this document as well to understand on how to search for different activities in their Cloud environment. We will cover a few examples such as finding activities in Azure AD, Exchange & SharePoint – Online.
The purpose of this documentation is to provide a basic understanding on how the structure of KQL works with ”hands-on” examples. It walks you through the different steps on searching and analyzing different datasets, and last, but not least. There is a homework section at the end of this document to make sure that you also practice it hands-on. There is nothing ”advanced” here, because the focus is on using common KQL operators in practice, and not the rare ones. That you might only use once a while.

DOWNLOAD REPORT

Tags: CybersecurityInformation Risk Insights StudyKQLKusto Query Language
7
VIEWS

Related Reports

Attacking Kerberos

Penetration testing of corporate information systems

CYBER ATTACK TRENDS: 2020 MID-YEAR REPORT

MORE

Movies

An Italian Job (1969)

Entertainment

TV Series: Devs

Stats

46.84% of all reported network-level attacks involve SMB exploits

CyberStory

CyberStory: The Hackers that Uploaded their Fingerprints To the Crime Scene

ADVERTISEMENT

Tags

Books Cyber Definition Cybersecurity Hackers Malware Memes Movies Quantum Computing Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials
  • CyberDecoded
  • Stats
  • CyberStory
  • CyberTips
  • Cyber Weekly

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.