Security-blog

Become smarter about cybersecurity.

Here, Morten Thomsen will be sharing knowledge, experiences, tips, and tricks from the cyber field and goes behind the scenes of current attacks, so organizations can identify vulnerabilities and strengthen their cybersecurity.

Get notified about new posts by following on Twitter and LinkedIn

10.Recommendations and Best Practices
Morten Thomsen Morten Thomsen

10.Recommendations and Best Practices

As we reach the final chapter on this KQL journey, it’s time to step back and see the bigger picture. Throughout this series, we’ve equipped you techniques—from foundational concepts to advanced filtering and automation—that empower you to analyze data with precision and uncover hidden insights. In this concluding post, we’ll distill all that knowledge into actionable recommendations and best practices, giving you the ultimate guide to mastering KQL. Whether you’re a beginner or an experienced professional, these strategies will help you unlock the full potential of your data.

Læs mere
9.Find the Needle in the Haystack
Morten Thomsen Morten Thomsen

9.Find the Needle in the Haystack

Ever feel overwhelmed trying to find actionable insights hidden within vast amounts of raw data? Microsoft Defender XDR and KQL are here to change that. This blog post dives into how KQL can help uncover the “needles” in your security data haystack—transforming scattered information into powerful insights.

Læs mere
8.Vulnerability Management with KQL
Morten Thomsen Morten Thomsen

8.Vulnerability Management with KQL

Are unpatched vulnerabilities leaving your organization exposed to cyber threats? In this post, I will explore how you can use Microsoft Defender XDR and KQL to take control of your vulnerability management. Learn how customized queries and actionable insights can help you prioritize and address security vulnerabilities, transforming raw data into a powerful defense strategy.

Læs mere
7.Automate Response with KQL
Morten Thomsen Morten Thomsen

7.Automate Response with KQL

Automation is not just a buzzword in the cybersecurity landscape; it's a necessity. Discover how to elevate your security operations with my upcoming post, "Automate Response with KQL." Learn how to harness the power of Kusto Query Language to create custom detection rules and automate incident responses, transforming your SOC into a proactive and highly efficient defense mechanism.

Læs mere
6.KQL for Threat Hunting
Morten Thomsen Morten Thomsen

6.KQL for Threat Hunting

This blog post delves into the practical application of KQL for threat hunting in cybersecurity. It explores how KQL can be utilized to enhance the speed and precision of threat detection and response within Security Operations Centers. Highlighting its versatility and effectiveness, the post offers insights into leveraging KQL to improve data analysis and bolster overall security operations.

Læs mere
5.Visualizing Data with KQL
Morten Thomsen Morten Thomsen

5.Visualizing Data with KQL

In this blog post I will dive into the world of data visualization using KQL. You will discover how to transform raw data into insightful, graphical representations that can highlight trends, patterns, and outliers with ease.

Læs mere
4.KQL Variables to Optimize Your Query
Morten Thomsen Morten Thomsen

4.KQL Variables to Optimize Your Query

In this fourth blog post of my blog post series on mastering KQL, I will explore the use of variables to optimize your queries. Specifically, I will delve into the `let` command, a powerful tool for enhancing the efficiency and readability of your KQL queries. By the end of this post, you will have a solid understanding of how to use the `let` command to its full potential, enabling you to write more effective and maintainable queries.

Læs mere
3.Advanced Filtering Techniques in KQL
Morten Thomsen Morten Thomsen

3.Advanced Filtering Techniques in KQL

Throughout our exploration of KQL, we have emphasized the significance of time-based queries and functions, highlighting their potential to enhance system monitoring and security. Additionally, we have discussed best practices, which facilitate more effective and efficient utilization of KQL's features. We will now advance into the complex domain of data filtering.

Læs mere
2.Time-Based Queries and Functions
Morten Thomsen Morten Thomsen

2.Time-Based Queries and Functions

As we delve deeper into KQL, we encounter an area that significantly enhances our capability to predict and prevent security threats: time-based queries and functions. Mastering these elements shifts our approach from mere reaction to anticipation, enabling us to identify and mitigate vulnerabilities before they escalate into serious breaches. This proactive methodology is crucial in the dynamic field of cybersecurity, where agility and foresight are of utmost importance. In this blog post, we will examine the complex and powerful realm of time-based queries and functions in KQL, which serve as essential tools for effective threat detection, monitoring, and response.

Læs mere
1.Understanding KQL: The Basics
Morten Thomsen Morten Thomsen

1.Understanding KQL: The Basics

Welcome to my new series on mastering Kusto Query Language (KQL) for enhanced Security Operations. This is the first of ten detailed blog posts aimed at equipping you with the knowledge and skills to effectively use KQL in Microsoft XDR and Microsoft Sentinel. In this introductory post, I will lay the foundation by exploring the basics of KQL, its syntax, and query structures.

Læs mere