%3CLINGO-SUB%20id%3D%22lingo-sub-1579366%22%20slang%3D%22en-US%22%3EOn-demand%20webcast%20series%3A%20%E2%80%9CTracking%20the%20adversary%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1579366%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20to%20everyone%20who%20joined%20us%20throughout%20these%20epic%20four%20episodes%20of%20%E2%80%9CTracking%20the%20adversary%E2%80%9D.%20We%20had%20lots%20of%20attendees%20and%20received%20overwhelming%20feedback!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDon%E2%80%99t%20worry%20if%20you%20missed%20any%20of%20the%20episodes.%20All%20webcasts%20have%20been%20recorded%2C%20so%20it%E2%80%99s%20not%20too%20late%20to%20become%20an%20expert%20in%20hunting%20for%20threats%20with%20advanced%20hunting%20in%20Microsoft%20Threat%20Protection.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20watch%20all%20four%20episodes%20on%20demand%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20style%3D%22width%3A%20821px%3B%22%20width%3D%22821%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22130px%22%20style%3D%22background-color%3A%20%230070c0%3B%20width%3A%20130px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23FFFFFF%22%3E%3CSTRONG%3ETitle%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22322.222px%22%20style%3D%22background-color%3A%20%230070c0%3B%20width%3A%20322.222px%3B%22%3E%3CP%3E%3CFONT%20color%3D%22%23FFFFFF%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290px%22%20style%3D%22background-color%3A%20%230070c0%3B%20width%3A%2090px%3B%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CFONT%20color%3D%22%23FFFFFF%22%3E%3CSTRONG%3EDownload%20MP4%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2276.6667px%22%20style%3D%22background-color%3A%20%230070c0%3B%20width%3A%2076.6667px%3B%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CFONT%20color%3D%22%23FFFFFF%22%3E%3CSTRONG%3EWatch%20on%20YouTube%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22130px%22%3E%3CP%3EEpisode%201%3A%20KQL%20fundamentals%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22322.222px%22%3E%3CP%3EIn%20the%20first%20episode%2C%20we%20cover%20the%20basics%20of%20advanced%20hunting%20capabilities%20in%20Microsoft%20Threat%20Protection%20(MTP).%20Learn%20about%20available%20advanced%20hunting%20data%20and%20basic%20KQL%20syntax%20and%20operators.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290px%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMTP15JUL20_MP4%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMP4%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2276.6667px%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2F0D9TkGjeJwM%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EYouTube%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22130px%22%3E%3CP%3EEpisode%202%3A%20Joins%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22322.222px%22%3E%3CP%3EIn%20episode%202%2C%20we%20continue%20learning%20about%20data%20in%20advanced%20hunting%20and%20how%20to%20join%20tables%20together.%20Learn%20about%20inner%2C%20outer%2C%20unique%2C%20and%20semi%20joins%2C%20as%20well%20as%20the%20nuances%20of%20the%20default%20Kusto%20innerunique%20join.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290px%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMTP22JUL20_MP4%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMP4%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2276.6667px%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2FLMrO6K5TWOU%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EYouTube%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22130px%22%3E%3CP%3EEpisode%203%3A%20Summarizing%2C%20pivoting%2C%20and%20visualizing%20data%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22322.222px%22%3E%3CP%3ENow%20that%20we%E2%80%99re%20able%20to%20filter%2C%20manipulate%2C%20and%20join%20data%2C%20it%E2%80%99s%20time%20to%20start%20summarizing%2C%20quantifying%2C%20pivoting%2C%20and%20visualizing.%20In%20this%20episode%2C%20we%20cover%20the%20summarize%20operator%20and%20some%20of%20the%20calculations%20you%20can%20perform%20while%20diving%20into%20additional%20tables%20in%20the%20advanced%20hunting%20schema.%20We%20turn%20our%20datasets%20into%20charts%20that%20can%20help%20improve%20analysis.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290px%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMTP29JUL20_MP4%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMP4%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2276.6667px%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2FUKnk9U1NH6Y%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EYouTube%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22130px%22%3E%3CP%3EEpisode%204%3A%20Let%E2%80%99s%20hunt!%26nbsp%3BApplying%20KQL%20to%20incident%20tracking%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22322.222px%22%3E%3CP%3ETime%20to%20track%20some%20attacker%20activity!%20In%20this%20episode%2C%20we%20use%20our%20improved%20understanding%20of%20KQL%20and%20advanced%20hunting%20in%20Microsoft%20Threat%20Protection%20to%20track%20an%20attack.%20Learn%20some%20of%20the%20tips%20and%20tricks%20used%20in%20the%20field%20to%20track%20attacker%20activity%2C%20including%20the%20ABCs%20of%20cybersecurity%20and%20how%20to%20apply%20them%20to%20incident%20response.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290px%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMTP5AUG20_MP4%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMP4%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2276.6667px%22%3E%3CP%20class%3D%22lia-align-center%22%3E%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2F2EUxOc_LNd8%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EYouTube%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20webcast%20series%20was%20presented%20by%20Michael%20Melone%2C%20Principal%20Program%20Manager%20at%20Microsoft%20and%20resident%20threat%20hunter.%20He%20started%20this%20webcast%20series%20with%20the%20basics%20of%20threat%20hunting%20and%20then%20continued%20with%20more%20sophisticated%20techniques%20in%20succeeding%20episode.%20Michael%20brings%20more%20than%20seven%20years%20of%20threat%20hunting%20experience%20from%20his%20time%20with%20Microsoft%20Detection%20and%20Response%20Team%20(DART)%2C%20where%20he%20responded%20to%20targeted%20attack%20incidents%20and%20helped%20our%20customers%20become%20cyber-resilient.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThroughout%20the%20series%2C%20he%20was%20joined%20by%20Tali%20Ash%2C%20the%20feature%20Program%20Manager%20for%20advanced%20hunting%2C%20who%20answered%20all%20your%20chat%20questions%20and%20presented%20some%20cool%20additional%20capabilities%20in%20the%20last%20episode.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20have%20any%20questions%20about%20advanced%20hunting%20or%20if%20there%20are%20specific%20scenarios%20or%20techniques%20you%20would%20like%20us%20to%20demonstrate%20in%20future%20webinars%2C%20please%20don%E2%80%99t%20hesitate%20to%20bring%20them%20up%20here%20in%20our%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-threat-protection%2Fshare-your-hunting-challenges%2Fm-p%2F1567334%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ETech%20Community%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAlso%2C%20sharing%20is%20caring!%20Now%20that%20you've%20become%20a%20hunting%20ninja%2C%20please%20share%20your%20hunting%20queries%20with%20the%20community%20at%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fhunting-queries%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fhunting-queries%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20more%20information%20about%20existing%20and%20future%20webcasts%2C%20visit%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fsecuritywebinars%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fsecuritywebinars%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHeike%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1579366%22%20slang%3D%22en-US%22%3E%3CP%3EDon%E2%80%99t%20worry%20if%20you%20missed%20any%20of%20the%20episodes.%20All%20webcasts%20have%20been%20recorded%2C%20so%20it%E2%80%99s%20not%20too%20late%20to%20become%20an%20expert%20in%20hunting%20for%20threats%20with%20advanced%20hunting%20in%20Microsoft%20Threat%20Protection.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22webinar-ondemand.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F211519i2702027C1D027173%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22webinar-ondemand.jpg%22%20alt%3D%22webinar-ondemand.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1579366%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAdvanced%20hunting%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Ekql%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Threat%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Hunting%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWebinar%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Thanks to everyone who joined us throughout these epic four episodes of “Tracking the adversary”. We had lots of attendees and received overwhelming feedback!

 

Don’t worry if you missed any of the episodes. All webcasts have been recorded, so it’s not too late to become an expert in hunting for threats with advanced hunting in Microsoft Threat Protection.

 

You can watch all four episodes on demand:

 

Title

Description

Download MP4

Watch on YouTube

Episode 1: KQL fundamentals

In the first episode, we cover the basics of advanced hunting capabilities in Microsoft Threat Protection (MTP). Learn about available advanced hunting data and basic KQL syntax and operators.

MP4

YouTube

Episode 2: Joins

In episode 2, we continue learning about data in advanced hunting and how to join tables together. Learn about inner, outer, unique, and semi joins, as well as the nuances of the default Kusto innerunique join.

MP4

YouTube

Episode 3: Summarizing, pivoting, and visualizing data

Now that we’re able to filter, manipulate, and join data, it’s time to start summarizing, quantifying, pivoting, and visualizing. In this episode, we cover the summarize operator and some of the calculations you can perform while diving into additional tables in the advanced hunting schema. We turn our datasets into charts that can help improve analysis.

MP4

YouTube

Episode 4: Let’s hunt! Applying KQL to incident tracking

Time to track some attacker activity! In this episode, we use our improved understanding of KQL and advanced hunting in Microsoft Threat Protection to track an attack. Learn some of the tips and tricks used in the field to track attacker activity, including the ABCs of cybersecurity and how to apply them to incident response.

MP4

YouTube

 

This webcast series was presented by Michael Melone, Principal Program Manager at Microsoft and resident threat hunter. He started this webcast series with the basics of threat hunting and then continued with more sophisticated techniques in succeeding episode. Michael brings more than seven years of threat hunting experience from his time with Microsoft Detection and Response Team (DART), where he responded to targeted attack incidents and helped our customers become cyber-resilient.

 

Throughout the series, he was joined by Tali Ash, the feature Program Manager for advanced hunting, who answered all your chat questions and presented some cool additional capabilities in the last episode.

 

If you have any questions about advanced hunting or if there are specific scenarios or techniques you would like us to demonstrate in future webinars, please don’t hesitate to bring them up here in our Tech Community.

 

Also, sharing is caring! Now that you've become a hunting ninja, please share your hunting queries with the community at https://aka.ms/hunting-queries.

 

For more information about existing and future webcasts, visit: https://aka.ms/securitywebinars

 

Heike