Share
The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting (in English)
Mark Morowczynski
(Author)
·
Rod Trent
(Author)
·
Matthew Zorich
(Author)
·
Microsoft Press
· Paperback
The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting (in English) - Morowczynski, Mark ; Trent, Rod ; Zorich, Matthew
$ 39.99
$ 49.99
You save: $ 10.00
Choose the list to add your product or create one New List
✓ Product added successfully to the Wishlist.
Go to My WishlistsIt will be shipped from our warehouse between
Monday, July 01 and
Tuesday, July 02.
You will receive it anywhere in United States between 1 and 3 business days after shipment.
Synopsis "The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting (in English)"
Learning KQL is a necessity for system administrators, Azure operators, and security analysts alike, ensuring workloads are monitored to be active, accessible, and secure in the Microsoft Azure cloud platform. KQL is a powerful query language that helps analyze a large volume of structured, semi structured, and unstructured data. KQL has inbuilt operators and functions that lets a user analyze data to find trends, patterns, anomalies, create forecasting, and machine learning. KQL underpins a variety of Microsoft cloud products--Microsoft Sentinel, Azure Data Explorer, Microsoft 365 Advanced Hunting, Azure Resource Graph, Azure Monitor and more. This book is designed to be the definitive guide to not only learning KQL but also to using KQL to solve real-world problems. As you learn parts of the language, the authors will show how that can be used to aid with daily operations and security investigations. At the completion of the book, you will have not only learned the language, but also operationalized KQL in your environment. This topic is important for anyone who manages anything in Azure and any service (AWS, GCP, etc.) being managed through an Azure-based security platform, as well as systems administrators, security consultants, security operations center analysts, and data scientists.