Get Free Shipping on orders over $79
The Definitive Guide to KQL : Using Kusto Query Language for operations, defending, and threat hunting - Mark Morowczynski

The Definitive Guide to KQL

Using Kusto Query Language for operations, defending, and threat hunting

By: Mark Morowczynski, Rod Trent, Matthew Zorich

eText | 16 May 2024 | Edition Number 1

At a Glance

eText


$60.95

or 4 interest-free payments of $15.24 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to risk assessment and remediation, speeding up detection time while reducing manual work using KQL. This accessible and practical guide—designed for a broad range of people with varying experience in KQL—will quickly make KQL second nature for information security.

Solve real problems with Kusto Query Language— and build your competitive advantage:

  • Learn the fundamentals of KQL—what it is and where it is used
  • Examine the anatomy of a KQL query
  • Understand why data summation and aggregation is important
  • See examples of data summation, including count, countif, and dcount
  • Learn the benefits of moving from raw data ingestion to a more automated approach for security operations
  • Unlock how to write efficient and effective queries
  • Work with advanced KQL operators, advanced data strings, and multivalued strings
  • Explore KQL for day-to-day admin tasks, performance, and troubleshooting
  • Use KQL across Azure, including app services and function apps
  • Delve into defending and threat hunting using KQL
  • Recognize indicators of compromise and anomaly detection
  • Learn to access and contribute to hunting queries via GitHub and workbooks via Microsoft Entra ID
on
Desktop
Tablet
Mobile

More in Network Security

Network Security : A Systems Approach - Larry L Peterson

eBOOK

Securing Cloud Native Apps - Michael Anderson

eBOOK

RRP $81.32

$65.99

19%
OFF
The (Un)Natural History of Malware - Lena Yu

eBOOK

RRP $54.23

$43.99

19%
OFF