
The Definitive Guide to KQL
Beschreibung
Solve real problems with Kusto Query Language- and build your competitive advantage:
Learn the fundamentals of KQL-what it is and where it is used
Examine the anatomy of a KQL query
Understand why data summation and aggregation is important
See examples of data summation, including count, countif, and dcount
Learn the benefits of moving from raw data ingestion to a more automated approach for security operations
Unlock how to write efficient and effective queries
Work with advanced KQL operators, advanced data strings, and multivalued strings
Explore KQL for day-to-day admin tasks, performance, and troubleshooting
Use KQL across Azure, including app services and function apps
Delve into defending and threat hunting using KQL
Recognize indicators of compromise and anomaly detection
Learn to access and contribute to hunting queries via GitHub and workbooks via Microsoft Entra ID
Weitere Details
Weitere Ausgaben
Personen
Rod Trent is a senior program manager at Microsoft, focused on cybersecurity and AI. He has spoken at many conferences over the past 30-some years and has written several books, including Must Learn KQL: Essential Learning for the Cloud-focused Data Scientist, and thousands of articles. He is a husband, dad, and first-time grandfather. In his spare time (if such a thing does truly exist), you can regularly find him simultaneously watching Six Million Dollar Man episodes and writing KQL queries. Rod can be found on LinkedIn and X (formerly Twitter) at @rodtrent.
Matthew Zorich was born and raised in Australia and works for the Microsoft GHOST team, which provides threat-hunting oversight to many areas of Microsoft. Before that, he worked for the Microsoft Detection and Response Team (DART) and dealt with some of the most complex and largest-scale cybersecurity compromises on the planet. Before joining Microsoft as a full-time employee, he was a Microsoft MVP, ran a blog focused on Microsoft Sentinel, and contributed hundreds of open-source KQL queries to the community. He is a die-hard sports fan, especially the NBA and cricket.
Inhalt
CHAPTER 1 Introduction and Fundamentals
CHAPTER 2 Data Aggregation
CHAPTER 3 Unlocking Insights with Advanced KQL Operators
CHAPTER 4 Operational Excellence with KQL
CHAPTER 5 KQL for Cybersecurity-Defending and Threat Hunting
CHAPTER 6 Advanced KQL Cybersecurity Use Cases and Operators
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.