top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome

Kusto KQL - Part 3D - Operators

KQL Numeric and Comparison Operators KQL provides a standard set of arithmetic and comparison operators used for calculations and filtering: Arithmetic Operators (return numeric values) + Addition - Subtraction * Multiplication / Division % Modulo (remainder) These are commonly used for: Rate calculations (e.g., bytes/sec) Data normalization Threshold comparisons Comparison & Membership Operators (return boolean values) > Greater than < Less than >= Greater tha

Kusto KQL - Part 4 - Variables and Arrays

KQL Essentials: Variables with let and Arrays with dynamic Kusto Query Language (KQL) supports variables using the let statement, which allows you to store values, expressions, or entire subqueries for reuse within a query. This enhances readability, reduces duplication, and improves maintainability of complex queries. Using let to Create Variables The let statement follows this basic format: let VariableName = ExpressionOrValue; Key Components of let statement: let – Keyword

Kusto KQL - Part 3C - Output Displays - Project, Render, Extend

Project Project lets you change values on output. Other options with project are 'project-away', 'project-keep', 'project-rename' (allows you to map an original field to its normalized name. this operator ensures that the field is still managed as a physical field and that handling the field is more performant)., 'project-reorder'. | project FreeGB=CounterValue / 1024 Other project ideas: | project <NewColumnName1> = <ExistingColumnName1>, <NewColumnName2> = <ExistingColumn

Kusto KQL - Part 3B - Sort, Summarize, Count & Distinct

Summarize and Count Simple Sorts: | sort by fieldname asc //or | sort by fieldname desc Simple Summarize: | summarize by fieldname desc Adding summarize and then counting" | summarize count () by fieldname Different example: | summarize count() by columname1, columnname2 | sort by count_ Other option for summarize and count and then filtering the output to only counts over certain limits. | summarize EventCount = count() by fieldname | where EventCount > 1000 To see the 1st v

Kusto KQL - Part 3A - Scalars and String Predicates

Diving into Scalars & String Predicates in KQL Now that we’ve covered how to view table schemas, perform basic searches, and filter logs by time, it’s time to go deeper into scalar operations and string matching in Kusto Query Language (KQL), key building blocks for powerful filtering. Types of KQL Statements Tabular Expressions – Return result sets (e.g., rows/columns from tables). Scalar Expressions – Return single values used in filters, projections, calculations. What Are

Kusto KQL - Part 2 - Dealing with Time

Working with Time in KQL Handling time effectively in Kusto Query Language (KQL) is essential for accurate analysis, efficient data management, and optimized query performance, especially when working in environments like Microsoft Sentinel or Microsoft Defender. Time Filtering Options Most logging platforms, including Microsoft Sentinel, provide a GUI-based datetime picker to filter logs within a specific timeframe. However, you can override the GUI time filter by specifying

Kusto KQL - Part 1 - Overview

Understanding KQL in the Microsoft Data Ecosystem In Microsoft's data ecosystem, KQL stands for Kusto Query Language. The name "Kusto" is a playful nod to Jacques Cousteau, the renowned deep-sea explorer. Just as Cousteau explored the depths of the oceans, KQL enables users to explore the depths of their data with power and precision. It’s worth noting that KQL is sometimes confused with another similarly named language: Kibana Query Language, used for querying data in Elasti

Sentinel SIEM Support of Digital Forensics Chain of Custody

Digital Investigations: Sentinel Log Export and Chain of Custody Overview Digital investigations increasingly rely on centralized log platforms such as Microsoft Sentinel to support forensic analysis. With this shift comes the requirement to maintain strict chain of custody for all exported data to ensure integrity, traceability, and admissibility. There are two primary approaches for exporting Sentinel data in support of investigations: Query-Based Export Manual Automated Di

Threat Hunt Program - Part 11 - Query Formatting

Threat Hunting SOP: Standardized Microsoft KQL Query Framework 1. Purpose This SOP establishes a standardized framework for developing, documenting, and maintaining Microsoft KQL queries used for Threat Hunting and Detection Engineering. The objective is to ensure consistency, repeatability, and operational effectiveness across all threat hunting activities. 2. Scope This standard applies to all: Threat Hunting queries Detection Engineering queries Microsoft Sentinel and Defe

Detection Engineering Program - Part 1 - Overview

Detection engineering is the strategic process of designing, developing, and continuously improving security detections to identify and respond to cyber threats effectively. It involves crafting high-fidelity detection rules, signatures, and behavioral analytics tailored to an organization's threat landscape. Key Components of Detection Engineering: Analyze threats and identify detection gaps – Leveraging threat intelligence to anticipate and detect emerging attack techniques

Detection Engineering Program - Part 5 - Detection Rollout

Detection Rollout Phase Detection rollout is a critical but often overlooked stage in the detection engineering lifecycle. Regardless of how well a detection is designed, tested, or documented, it provides no value unless it is properly deployed into the environment. In many organizations, detection rollouts are not standardized. This gap is commonly caused by overreliance on vendor-supplied detections (e.g., from SIEM platforms, EDR/XDR platforms), a lack of dedicated detect

Detection Engineering Program - Part 4 - Detection Testing & Validation

Detection Testing & Validation Detection Measurement Concepts Understanding how to evaluate a detection's performance is essential for tuning rules, prioritizing engineering efforts, and managing SOC efficiency. Key measurement concepts include: 1. Precision (a.k.a. True Positive Rate / Confidence): This measures how many of the triggered alerts are actually true positives. Formula: True Positives / (True Positives + False Positives) High precision means minimal false positi

Detection Engineering Program - Part 3 - Detection Tracking

Identifying and Tracking Detections An essential part of improving your detection capabilities is establishing a structured approach to inventory and track your detection rules. The first step is determining where and how detections will be tracked. However, several key considerations must be taken into account: Visibility into Detections – Many cybersecurity tools operate proprietary detection engines, which are not publicly exposed. Tracking every individual rule within too

DHS SCubA Projects

DHS CISA SCuBA (Secure Cloud Business Applications) DHS CISA SCuBA (Secure Cloud Business Applications) is a security assessment framework and toolset developed by Cybersecurity and Infrastructure Security Agency to evaluate the security posture of cloud-based SaaS environments, primarily Microsoft 365 and similar platforms. At a technical level, SCuBA provides: Baseline security configuration checks aligned to federal guidance (e.g., logging, identity controls, sharing setti

Log Collection Microsoft Defender, AMA and Microsoft Sentinel SIEM

Application log collection to Sentinel SIEM in a Microsoft defender environment Microsoft Defender for Endpoint (MDE) is a highly capable EDR platform that, when deployed to workstations and servers, collects extensive telemetry including process creation, network connections, file activity, registry changes, authentication events, and security logs. Out of the box, it provides deep endpoint visibility, functionally similar to an enhanced, enterprise-grade Sysmon. In many cas

Threat Hunt (TH) Program Part 6 - Threat Hunt Mission Organization in SIEM/XDR

Threat Hunt Mission Organization in SIEM/XDR Standard Operating Procedure (SOP) 1. Purpose This Standard Operating Procedure (SOP) defines the standards, steps, and required configurations for organizing and executing Threat Hunt missions within Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) platforms. It establishes a consistent, repeatable methodology for structuring hunt workspaces, managing queries, capturing findings, and prod

Threat Hunt (TH) Program Part 8 - Threat Hunt Mission Reporting

Threat Hunt Mission Reporting SOP 1. Purpose This Standard Operating Procedure (SOP) defines the requirements, structure, and standards for producing Threat Hunt Mission Reports. A Threat Hunt Mission Report is the formal deliverable published upon the completion of every Threat Hunt mission. It provides stakeholders with a comprehensive record of the hunt objectives, methodology, findings, indicators of compromise, detection outputs, and recommendations for improving the or

Threat Hunt (TH) Programs Part 5 - Mission Execution

Threat Hunt Mission Execution SOP 1. Purpose This Standard Operating Procedure (SOP) establishes the standardized process, roles, responsibilities, and operational expectations governing the execution phase of Cyber Threat Hunt missions. It is designed to ensure consistency, analytical rigor, and operational effectiveness across all threat hunting activities conducted by the Security Operations Center (SOC) Threat Hunt team. 2. Scope This SOP applies to all personnel particip

Threat Hunt (TH) Program Part 9 - Threat Hunt Program Training

Threat Hunt Program Training - Standard Operating Procedure (SOP) 1. Purpose This Standard Operating Procedure (SOP) establishes the training framework for personnel assigned to the Threat Hunting program. The objective is to ensure that threat hunters develop the technical, analytical, and operational competencies required to proactively identify adversary activity within the organization’s environment. This SOP defines: Required threat hunting skill domains Training phases

Threat Hunt (TH) Programs - Understanding Threat Hunt Frameworks

Threat Hunting Frameworks Threat hunting is a proactive cybersecurity discipline that requires structure, strategy, and context. Two of the most popular threat hunting frameworks are PEAK and TaHiTI, with the MITRE ATT&CK framework playing a foundational role across all threat hunting efforts. PEAK stands for Prepare, Execute, and Act with Knowledge . TaHiTI stands for Targeted Hunting Integrating Threat Intelligence . MITRE ATT&CK, while not a hunting framework per se, is a

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page