home.social

#kql — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #kql, aggregated by home.social.

  1. Hunting CVE-2026-41096 (Windows DNS Client RCE, CVSS 9.8) in Advanced Hunting?

    DeviceProcessEvents
    | where Timestamp > ago(7d)
    | where InitiatingProcessFileName =~ "svchost.exe"
    | where InitiatingProcessCommandLine has_any ("dnscache", "NetworkService")
    | where FileName !in~ ("conhost.exe", "WerFault.exe", "wermgr.exe")
    | project Timestamp, DeviceName, FileName, ProcessCommandLine
    | order by Timestamp desc

    #CVE202641096 #KQL #ThreatHunting #MDE

  2. *Read it like an infomercial*

    Are you tired of working with logs that contain arrays with multiple JSON like this?

    Have you tried creating a new column with the value you want only to find out that this value has no fixed position in the array?

    Now your problems are over! With this 5 line KQL snippet, written by a real human, you can finally have the peace of mind that all the fields are populated correctly and everything is neat inside a single JSON!

    github.com/0x-cde/Threat-Hunti

    #kusto #kustoquery #kql #threathunting #threat_hunting #dfir #digitalforensics

  3. 🕵️‍♂️ KQL is both a science and an art.

    If you’ve ever felt your Sentinel queries were running slow or costing more than they should, you’re not alone.
    This week’s #SentinelSaturdays covers how to write leaner, faster, more efficient KQL queries with practical examples you can use today.

    🔗 Read the full walkthrough here: marshsecurity.org/sentinel-ski

    Share your comments 👇
    What’s YOUR top KQL tip or favourite optimisation trick?

    Let’s build a thread of practical advice for the hunting community.
    #MicrosoftSentinel #KQL #ThreatHunting #SecurityOperations

  4. 🕵️‍♂️ KQL is both a science and an art.

    If you’ve ever felt your Sentinel queries were running slow or costing more than they should, you’re not alone.
    This week’s #SentinelSaturdays covers how to write leaner, faster, more efficient KQL queries with practical examples you can use today.

    🔗 Read the full walkthrough here: marshsecurity.org/sentinel-ski

    Share your comments 👇
    What’s YOUR top KQL tip or favourite optimisation trick?

    Let’s build a thread of practical advice for the hunting community.
    #MicrosoftSentinel #KQL #ThreatHunting #SecurityOperations

  5. 🕵️‍♂️ KQL is both a science and an art.

    If you’ve ever felt your Sentinel queries were running slow or costing more than they should, you’re not alone.
    This week’s #SentinelSaturdays covers how to write leaner, faster, more efficient KQL queries with practical examples you can use today.

    🔗 Read the full walkthrough here: marshsecurity.org/sentinel-ski

    Share your comments 👇
    What’s YOUR top KQL tip or favourite optimisation trick?

    Let’s build a thread of practical advice for the hunting community.
    #MicrosoftSentinel #KQL #ThreatHunting #SecurityOperations

  6. 🕵️‍♂️ KQL is both a science and an art.

    If you’ve ever felt your Sentinel queries were running slow or costing more than they should, you’re not alone.
    This week’s #SentinelSaturdays covers how to write leaner, faster, more efficient KQL queries with practical examples you can use today.

    🔗 Read the full walkthrough here: marshsecurity.org/sentinel-ski

    Share your comments 👇
    What’s YOUR top KQL tip or favourite optimisation trick?

    Let’s build a thread of practical advice for the hunting community.
    #MicrosoftSentinel #KQL #ThreatHunting #SecurityOperations

  7. I'm starting to work with #Microsoft #Sentinel, so I want to teach myself the basics of #KQL. There's a tutorial: learn.microsoft.com/en-us/kust . It sends me to learn.microsoft.com/en-us/fabr to get the sample data.
    I follow the instructions and end up with data that doesn't match the tutorial so none of the queries in the tutorial work (the query expects a table "StormEvents", the data has "Weather" instead).
    This is first experience Microsoft gives to people trying to learn their technology.
    smdh

  8. How to Use Azure Monitor to Gain Insights and Ensure Application Health

    In modern cloud environments, maintaining the health and performance of applications is critical. Azure Monitor provides a full-stack monitoring solution that enables organizations to track metrics, diagnose issues, and gain deep insights into their applications and infrastructure.

    azuretracks.com/?p=2781

  9. #KQL query that looks for network connections to these domains via #MDE DeviceNetworkEvents (Connection or DNS Query).

    github.com/SecurityAura/DE-TH-

    Huge thanks to @racwatchin8872 for making the data available in a way that can be accessed via externaldata 🙏

  10. 🚨 Test your Lateral Movement investigation skills!

    I have just added a new challenge to my FREE "Hands-On Introduction to KQL for Security Analysis" course!

    You can even test your AI agents' skills 😉

    #KQL#Kusto#MicrosoftSentinel#MicrosoftDefender

    academy.bluraven.io/course/int

  11. 🐣 HAPPY EASTER CAPSTONE! 🛡️

    My KQL courses now include a complete attack scenario to test your skills — end to end.

    🎯 Hands-on labs
    📉 20% OFF for a limited time!
    Crack it open 👇

    #KQL #Kusto #ThreatHunting #DetectionEngineering #DFIR

    academy.bluraven.io

  12. 🎁 NEW UPDATE:

    I've added a small challenge to my FREE "Hands-On Introduction to KQL for Security Analysis" course.

    More will be coming soon!

    #KQL #Kusto #MicrosoftDefender #MicrosoftSentinel
    👇
    academy.bluraven.io/course/int

  13. 🚨 FREE unlimited lab access to "Introduction to KQL for Security Analysis" course!

    Thrilled to announce that my Intro to KQL for Security Analysis lab environment is now completely free with no time restrictions!

    academy.bluraven.io/course/int

    #KQL #Kusto #ThreatHunting #Infosec

  14. Detect suspicious foci token logins:
    The in cluded description includes an explanation what foci tokens are and why a hunt might be useful. Nice work!

    github.com/HybridBrothers/Hunt
    #DFIR #BlueTeam #KQL

  15. If you can completely disable device code flows using Conditional Access, you should do so. If you cannot, at least limit which user IDs can use them. If you allow any users to use device code flows, use the #KQL provided to hunt for abuse.

    #cybersecurity #microsoft

    From: @fabian_bader
    infosec.exchange/@fabian_bader

  16. 💙 Fall in Love with Threat Hunting, Incident Response, and Detection Engineering using #KQL 💙
    Code: VLTN30
    Valid until 17.02

    academy.bluraven.io/

    #ThreatHunting

  17. Last call!

    Join us next week at Black Hat Europe #BHEU on 9th-10th in London for our Defending Enterprises - 2024 Edition 2-day training.

    Tickets are selling well so you don't want to miss out on festive threat hunting, Christmassy monitoring and jingling alerts!

    blackhat.com/eu-24/training/sc

    #kql #threathunting #blueteam #training #cybersecurity #hacking

  18. KQL

    Kusto Query Language (KQL) is a powerful query language that is used to query Azure Data Explorer (ADX) and Azure Monitor log data. KQL is used to query data in tables, summarize d(...)

    #adx #anomalydetection #azure #kql #kusto

    taoofmac.com/space/dev/kql

  19. Only 5 days to go until our both our Hacking Enterprises and Defending Enterprises training classes kick off at Black Hat USA.

    There's still time to snag yourself a ticket for either the weekend or weekday delivery and we'd love to help level up your skills in either offensive or defensive techniques, or both!

    Wreak havoc with in our multi-domain enterprise environment and then hunt, detect, monitor and alert after, or vice versa!

    in.security/events/

    #pentesting #redteam #hacking #training #cybersecurity #BHUSA #blueteam #kql #microsoftsentinel #threathunting

  20. Less than a month to go until Black Hat USA 👀. I suppose the only thing to say is I look forward to seeing you on either our Hacking Enterprises or Defending Enterprises trainings, or maybe both!

    ...and if I don't, I suppose the only question to ask is, why haven't your bought your ticket yet? 😎 From phishing, C2, IPv6 and rampaging through multi-domain trusts, to deep threat hunting, monitoring and alerting in our Sentinel lab - I suppose the REAL question is, how many friends or colleagues are signing up with you?!

    in.security/events/

    #pentesting #hacking #redteam #BHUSA #bluetam #threathunting #kql #microsoftsentinel

  21. 🔍 Advanced Time Series Anomaly Detection: Discover methods you’ve never seen before.
    🔗 Attack Path & Execution Chain Detection with Process Mining: A novel approach to threat detection.
    🌐 Attack Pattern Detection Using Graph Semantics: Start thinking in graphs and revolutionize your detection and investigation skills.

    academy.bluraven.io/advanced-h

    #KQL #Kusto #SIEM #MicrosoftSentinel #MicrosoftDefender #MicrosoftDefenderXDR #Defender #cybersecurity #KQLForSecurityAnalysts #ThreatHunting #DetectionEngineering #training #dfir #incidentresponse

  22. Self-Hosting Kusto

    This is going to be an unusual one, partly because it is about a Microsoft thing (which I typically avoid) and because it’s going to be a bit of a brain dump.(...)

    #adx #ai #azure #docker #jupyter #kql #kusto #ml #parquet #polars

    taoofmac.com/space/blog/2024/0

  23. 🚀 FREE Hands-On KQL for Security Analysis Course is now available! 🚀
    ✅ 50 seats bi-monthly
    ✅ Certificate of completion
    ✅ 14-day lab with real-world Microsoft Sentinel and Defender XDR logs 🔥🔥
    Enroll for #FREE 👇
    academy.bluraven.io/intro-to-k
    #KQL #Kusto #SIEM #MicrosoftSentinel #MicrosoftDefender #Defender #cybersecurity #KQLForSecurityAnalysts #training

  24. Made a thing for poking around sigma rules adonm.github.io/stlite-apps/ap including conversion to defender kql

    Source is up github.com/adonm/stlite-apps/b (less than 100 lines!), streamlit lite is quite nice to play with

    rules are grabbed from here - github.com/SigmaHQ/sigma

  25. 🚨 #KQL Course Update and Anniversary Discount!

    The "Hands-On Kusto Query Language (KQL) for Security Analysts" course has been updated with 5 new exercises focusing on aggregations to answer investigative questions, with more to come! The course now offers:
    ✅ Lots of examples in the lessons
    ✅ A total of 23 exercises
    ✅ 2 Investigation scenarios
    allowing you to enhance your skills in Kusto Query Language.

    Last ~24 hours to get it 30% OFF!

    academy.bluraven.io/hands-on-k

    #KQL
    #SecurityAnalysis
    #Training
    #ThreatHunting
    #IncidentResponse
    #MicrosoftSentinel
    #MicrosoftDefender
    #M365Defender
    #DFIR
    #DataAnalysis

  26. In.security's 2024 training schedule has it's first two additions. Pentesting and threat hunting training anyone?!

    Hacking Enterprises - 2024 Red Edition, running April 16-17 in-person at Black Hat Asia

    blackhat.com/asia-24/training/

    Defending Enterprises - 2024 Edition, running April 18-19 in-person at BruCON Spring training

    brucon.org/2024/brucon-2024-tr

    #hacking #redteam #pentest #blueteam #kql #MicrosoftSentinel

  27. @smfinlay
    I've seen some inconsistent behavior with case sensitivity with ==, maybe see if it works if the case matches. Could also be a space in the data.

    #DefenderforEndpoint #KQL

  28. @smfinlay
    I've seen some inconsistent behavior with case sensitivity with ==, maybe see if it works if the case matches. Could also be a space in the data.

    #DefenderforEndpoint #KQL

  29. @smfinlay
    I've seen some inconsistent behavior with case sensitivity with ==, maybe see if it works if the case matches. Could also be a space in the data.

    #DefenderforEndpoint #KQL

  30. @smfinlay
    I've seen some inconsistent behavior with case sensitivity with ==, maybe see if it works if the case matches. Could also be a space in the data.

    #DefenderforEndpoint #KQL

  31. For those familiar with #DefenderforEndpoint and #KQL advanced hunting, do you know why I would get results from the query using the "contains" operator and get no results using the "==" operator?

  32. For those familiar with #DefenderforEndpoint and #KQL advanced hunting, do you know why I would get results from the query using the "contains" operator and get no results using the "==" operator?