Security-blog

Become smarter about cybersecurity.

Here, Morten Thomsen will be sharing knowledge, experiences, tips, and tricks from the cyber field and goes behind the scenes of current attacks, so organizations can identify vulnerabilities and strengthen their cybersecurity.

Get notified about new posts by following on Twitter and LinkedIn

10.Recommendations and Best Practices
Morten Thomsen Morten Thomsen

10.Recommendations and Best Practices

As we reach the final chapter on this KQL journey, it’s time to step back and see the bigger picture. Throughout this series, we’ve equipped you techniques—from foundational concepts to advanced filtering and automation—that empower you to analyze data with precision and uncover hidden insights. In this concluding post, we’ll distill all that knowledge into actionable recommendations and best practices, giving you the ultimate guide to mastering KQL. Whether you’re a beginner or an experienced professional, these strategies will help you unlock the full potential of your data.

Læs mere
9.Find the Needle in the Haystack
Morten Thomsen Morten Thomsen

9.Find the Needle in the Haystack

Ever feel overwhelmed trying to find actionable insights hidden within vast amounts of raw data? Microsoft Defender XDR and KQL are here to change that. This blog post dives into how KQL can help uncover the “needles” in your security data haystack—transforming scattered information into powerful insights.

Læs mere
8.Vulnerability Management with KQL
Morten Thomsen Morten Thomsen

8.Vulnerability Management with KQL

Are unpatched vulnerabilities leaving your organization exposed to cyber threats? In this post, I will explore how you can use Microsoft Defender XDR and KQL to take control of your vulnerability management. Learn how customized queries and actionable insights can help you prioritize and address security vulnerabilities, transforming raw data into a powerful defense strategy.

Læs mere
7.Automate Response with KQL
Morten Thomsen Morten Thomsen

7.Automate Response with KQL

Automation is not just a buzzword in the cybersecurity landscape; it's a necessity. Discover how to elevate your security operations with my upcoming post, "Automate Response with KQL." Learn how to harness the power of Kusto Query Language to create custom detection rules and automate incident responses, transforming your SOC into a proactive and highly efficient defense mechanism.

Læs mere
6.KQL for Threat Hunting
Morten Thomsen Morten Thomsen

6.KQL for Threat Hunting

This blog post delves into the practical application of KQL for threat hunting in cybersecurity. It explores how KQL can be utilized to enhance the speed and precision of threat detection and response within Security Operations Centers. Highlighting its versatility and effectiveness, the post offers insights into leveraging KQL to improve data analysis and bolster overall security operations.

Læs mere
5.Visualizing Data with KQL
Morten Thomsen Morten Thomsen

5.Visualizing Data with KQL

In this blog post I will dive into the world of data visualization using KQL. You will discover how to transform raw data into insightful, graphical representations that can highlight trends, patterns, and outliers with ease.

Læs mere
4.KQL Variables to Optimize Your Query
Morten Thomsen Morten Thomsen

4.KQL Variables to Optimize Your Query

In this fourth blog post of my blog post series on mastering KQL, I will explore the use of variables to optimize your queries. Specifically, I will delve into the `let` command, a powerful tool for enhancing the efficiency and readability of your KQL queries. By the end of this post, you will have a solid understanding of how to use the `let` command to its full potential, enabling you to write more effective and maintainable queries.

Læs mere
3.Advanced Filtering Techniques in KQL
Morten Thomsen Morten Thomsen

3.Advanced Filtering Techniques in KQL

Throughout our exploration of KQL, we have emphasized the significance of time-based queries and functions, highlighting their potential to enhance system monitoring and security. Additionally, we have discussed best practices, which facilitate more effective and efficient utilization of KQL's features. We will now advance into the complex domain of data filtering.

Læs mere
2.Time-Based Queries and Functions
Morten Thomsen Morten Thomsen

2.Time-Based Queries and Functions

As we delve deeper into KQL, we encounter an area that significantly enhances our capability to predict and prevent security threats: time-based queries and functions. Mastering these elements shifts our approach from mere reaction to anticipation, enabling us to identify and mitigate vulnerabilities before they escalate into serious breaches. This proactive methodology is crucial in the dynamic field of cybersecurity, where agility and foresight are of utmost importance. In this blog post, we will examine the complex and powerful realm of time-based queries and functions in KQL, which serve as essential tools for effective threat detection, monitoring, and response.

Læs mere
1.Understanding KQL: The Basics
Morten Thomsen Morten Thomsen

1.Understanding KQL: The Basics

Welcome to my new series on mastering Kusto Query Language (KQL) for enhanced Security Operations. This is the first of ten detailed blog posts aimed at equipping you with the knowledge and skills to effectively use KQL in Microsoft XDR and Microsoft Sentinel. In this introductory post, I will lay the foundation by exploring the basics of KQL, its syntax, and query structures.

Læs mere
Microsoft Defender XDR: Device Isolation and Contain Device
Morten Thomsen Morten Thomsen

Microsoft Defender XDR: Device Isolation and Contain Device

Microsoft Defender XDR offers numerous features, two of which are particularly crucial for incident management. Unfortunately, one of these important features is not well known, so I want to provide insights and share experiences where it is relevant. There's limited information available on the Contain Device feature, but I've explained it in a clear and comprehensible manner.

Læs mere
Part 10: Case Studies and Success Stories
Morten Thomsen Morten Thomsen

Part 10: Case Studies and Success Stories

In the final installment of the Defender XDR series, this 10th blog post shares some true stories of businesses that have effectively leveraged Defender XDR to derive benefits from their E5 Security license investments.

Læs mere
Part 9: Sentinel Integration to XDR
Morten Thomsen Morten Thomsen

Part 9: Sentinel Integration to XDR

In this 9th blog post, I will explain what Sentinel Integration to XDR is, how it works, and why it is a game changer for SOC efficiency. I will also share my recommendations on how to get started with Sentinel Integration to XDR and what benefits you can expect from it.

Læs mere
Part 8: Secure Score
Morten Thomsen Morten Thomsen

Part 8: Secure Score

In the 8th blog post you will learn how to effectively leverage all your insights to prioritize tasks and obtain the assistance needed to secure your environment comprehensively, encompassing endpoints, email, applications, and identity.

Læs mere
Part 7: Cross-Domain Security
Morten Thomsen Morten Thomsen

Part 7: Cross-Domain Security

This 7th blog post explains how Microsoft's integrated solution helps you secure your organization from cyber threats in different domains.

Læs mere
Part 6: Advanced Hunting Queries
Morten Thomsen Morten Thomsen

Part 6: Advanced Hunting Queries

In this sixth blog post I will give you a deeper dive into Advanced hunting. It will show how to do advanced hunting queries in Microsoft XDR to proactively search for potential threats and suspicious activities.

Læs mere
Part 5: Microsoft XDR Advanced Hunting and Automating Security Workflows
Morten Thomsen Morten Thomsen

Part 5: Microsoft XDR Advanced Hunting and Automating Security Workflows

In this fifth blog post I will explore how to use Microsoft XDR to automate security workflows and improve efficiency and response times. One of the key features of Microsoft XDR is advanced hunting, which allows you to run complex queries across various data sources and hunt for threats and anomalies. Advanced hunting can be combined with custom detection rules, which are a way to create custom alerts and trigger automated responses based on advanced hunting queries.

Læs mere
Part 4: Exposure Management
Morten Thomsen Morten Thomsen

Part 4: Exposure Management

In this fourth blog post, I will go over the features and benefits of Microsoft Exposure Management and how it can help you lower your exposure and enhance your security posture. If you are a security professional looking for a better way to manage your security exposure, you might be interested in Microsoft Exposure Management in Microsoft XDR.

Læs mere