maartengoet / KQLLinks
KQL queries
☆13Updated 6 years ago
Alternatives and similar repositories for KQL
Users that are interested in KQL are comparing it to the libraries listed below
Sorting:
- KQL example queries for working in Azure☆33Updated 11 months ago
- ☆19Updated last year
- A WDAC configuration repository with the sole intention of enriching MDE☆29Updated 3 weeks ago
- A list of Entra ID (Azure AD) Audit event names and the corresponding Microsoft Graph Request Uri☆30Updated 9 months ago
- Automation around Entra ID☆37Updated 7 months ago
- ☆43Updated 4 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆20Updated 10 months ago
- Solution to deploy a Sentinel playground demo environment☆56Updated 2 years ago
- KQL for Azure Resource Manager and AppID search☆23Updated 11 months ago
- Azure AD Incident Response☆26Updated 3 years ago
- ☆31Updated last year
- MS Entra ID Protection Guidance☆21Updated last year
- ☆20Updated last year
- ☆42Updated last year
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆36Updated 5 months ago
- ☆17Updated 3 years ago
- Extensible Azure Security Tool - Documentation☆82Updated 2 years ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆39Updated 2 years ago
- ☆50Updated 5 years ago
- Microsoft Sentinel related content☆37Updated 5 months ago
- This repository is for a beginners PowerShell training course I am holding in central Missouri.☆20Updated 8 years ago
- Microsoft Cloud App Security labs☆14Updated 6 years ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Updated 6 years ago
- Microsoft Entra ID App Audit Solution (AADAppAudit)☆83Updated 10 months ago
- PowerShell Module for managing Microsoft Defender Advanced Threat Protection☆71Updated 2 years ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆107Updated 7 months ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Updated last year
- Little PowerShell module to extract PowerShell scripts that no longer exists on disk but were run and are still in Event Logs.☆41Updated 4 years ago
- Check you Sentinel environment using Pester infrastructure tests☆31Updated last year
- ☆13Updated 3 years ago