Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 43c897e

Browse files
authored
Update README.md
1 parent b3439dd commit 43c897e

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
1-
#Tracking The Adversary
1+
# Tracking The Adversary
22
**[Webcast Link](https://techcommunity.microsoft.com/t5/microsoft-threat-protection/webinar-series-unleash-the-hunter-in-you/ba-p/1509232)**
33
This webcast is designed to take you from newbie to ninja on advanced hunting in four episodes. This repo contains the query files used in each of the webcasts so that you can hunt in your own MTP instance.
44

55
---
66

7-
#Episode 1: KQL Fundamentals
7+
# Episode 1: KQL Fundamentals
88
In the first episode, we will cover the basics of advanced hunting capabilities in Microsoft Threat Protection (MTP). Learn about available advanced hunting data and basic KQL syntax and operators. The best part? No slides!
99

1010
---
1111

12-
#Episode 2: Joins
12+
# Episode 2: Joins
1313
In episode 2, we will continue learning about data in advanced hunting and how to join tables together. Learn about inner, outer, unique, and semi joins, as well as the nuances of the default Kusto innerunique join. Make Edgar F. Codd proud!
1414

1515
---
1616

17-
#Episode 3: Summarizing, pivoting, and visualizing Data
17+
# Episode 3: Summarizing, pivoting, and visualizing Data
1818
Now that we’re able to filter, manipulate, and join data, it’s time to start summarizing, quantifying, pivoting, and visualizing. In this episode, we will cover the summarize operator and some of the various calculations you can perform while diving into additional tables within MTP. We will turn our datasets into charts that can help improve analysis.
1919

2020
---
2121

22-
#Episode 4: Let’s hunt! Applying KQL to incident tracking
22+
# Episode 4: Let’s hunt! Applying KQL to incident tracking
2323
Time to track some attacker activity! In this episode, we will use our improved understanding of KQL and advanced hunting in Microsoft Threat Protection to track an attack. Learn some of the tips and tricks used in the field to track attacker activity, including the ABCs of cybersecurity and how to apply them to incident response.

0 commit comments

Comments
 (0)