Process Execution (KQL Triage)
Phase 1: Understand Windows Event Logs & KQL Basics
Objective: Gain foundational knowledge of Windows Event Logs and KQL for querying logs in Microsoft Sentinel.
Phase 2: Detect Suspicious Process Execution
Objective: Use KQL to detect suspicious process execution patterns in Sentinel and Defender XDR.
Phase 3: Investigate and Analyse
Objective: Perform in-depth analysis of suspicious process execution.
Phase 4: Respond and Mitigate
Objective: Automate detection and response workflows using KQL in Sentinel and Defender XDR.
Phase 5: Continuous Monitoring & Improvement
Objective: Continuously monitor and improve detection capabilities.
Final Thoughts
Last updated