Sitemap - 2025 - Rod’s Blog
Go Beyond the Dashboard: Build Custom Garmin Data Views with KQL
The Hidden Costs of AI-Assisted Writing: Cognitive Debt
Harnessing the KQL let Operator for Testing and Learning
Automation & Ethical Security: Balancing Efficiency with Responsible AI Safeguards
Exploring the Limits: What KQL Can’t Do—and Creative Workarounds
Framing Humanoid Security for Healthcare, Logistics, and Defense
After the Blog Episode 24: Mid-2025 AI Security Update
The Power of Diligent Work (Proverbs 14:23)
KQL Kung Fu: Real-World Challenges to Sharpen Your Skills
After the Blog Episode 23: Must Learn KQL Advanced Edition
Visualizing with KQL: Best Practices for Render and Timechart Operators
Let’s Get Scalar: Creating Reusable KQL Functions for Cleaner Queries
Mastering High-Stakes Negotiations: Advanced Tactics Used by Top Executives
Time-Series Analysis with KQL: Unlocking Trends and Forecasting in Azure
Seeking the Food That Endures: A Reflection on John 6:27
Correlating Logs Across Azure Services with KQL
Extending KQL with Inline Functions: Simplifying Complex Queries
Automating Alerts with KQL in Azure Monitor: A Step-by-Step Guide
Harnessing KQL for Machine Learning Data Prep in Azure Data Explorer
KQL vs. SQL: Bridging the Gap for Azure Users
Advanced Pattern Matching in Kusto Query Language (KQL): Unlocking Complex Log Parsing in Azure
KQL for DevOps: Monitoring Azure Pipelines with Performance Insights and Failure Diagnostics
Supply Chain Mastery in a Volatile World: Strategies for Resilience in Logistics and Procurement
KQL Query Optimization: Techniques to Boost Efficiency and Slash Processing Time
Cybersecurity for Professionals: Personal Risk Management and Digital Self-Defense Strategies
Faith and Work: Integrating Biblical Wisdom into Business Ethics
Detecting Suspicious Activities in Microsoft Sentinel: Writing Threat-Hunting Queries Using KQL
The AI Assistant Wars: Will Mobile Strategy Define the Future?
Parsing & Extracting Data from JSON Columns using KQL: Handling Nested Structures Efficiently
Building Custom Dashboards with KQL & Workbook Queries: Enhancing Visibility in Security Operations
Humanoid Robot Security in 2025 vs. Runaway (1984): A Tale of Tech and Turmoil
Deep Work in a Distracted World: Strategies for Cultivating Focus in the Digital Age
Using KQL to Enhance Log Analytics: Best Practices for Filtering, Aggregating, and Visualizing Logs
Is Humanoid Robot Security Actually Just AI Security?
Strategic Thinking for Long-Term Success
Using KQL to Query Large Datasets Efficiently
The Next Security Frontier: Humanoids
Following the Example of Diligence: A Devotional on 2 Thessalonians 3:9-11
Understanding KQL Datatypes & Operators
Common Mistakes in KQL & How to Avoid Them: Debugging Strategies for Typical Pitfalls
Top Qualities and Skills to Land a Job Working with Microsoft Purview
After the Blog Episode 22: Microsoft Purview Summer Camp
The Vital Importance of Data Security in the Zero Trust Model Amid the Rise of Generative AI
Pattern Matching with KQL Regular Expressions: Using the Parse and Extract Functions to Clean Data
Psalm 90:17: Establishing the Work of Our Hands
Anomaly Detection with KQL: Leveraging Time-Series Analysis for Security Insights
Building a Brand with Thought Leadership Content: Structuring Blogs, Podcasts, and Books for Impact
Parsing & Extracting Data from JSON Columns in KQL: Handling Nested Structures Efficiently
Microsoft Security Sessions at Microsoft Build
The Credibility Economy: Building Reputational Capital for Long-Term Success
Exploring the mv-apply Operator in Kusto Query Language
Handling the Entities column in the SecurityAlert table as a Top-Level Field
From Specialist to Thought Leader: How Professionals Can Position Themselves as Industry Authorities
Exploring the Power of the KQL Evaluate Operator
The Science of Peak Performance
Reflections on Proverbs 12:11: The Value of Diligence and Purpose
Why Security is Everyone’s Responsibility: A Call to Developers
Understanding the KQL mv-expand Operator
The Psychology of Influence in Leadership: Shaping Decisions and Motivating Teams
Understanding the KQL Parse Operator
Understanding Tabular Expression Statements in Kusto Query Language (KQL)
Mastering Professional Surveys: Best Practices for Crafting Actionable Insights for Businesses
Understanding the Restrict Statement in Kusto Query Language (KQL)
Creating Geospatial Visualizations with Kusto Query Language (KQL)
Navigating Compliance Challenges: Breaking Down Evolving Regulatory Requirements Like GDPR and NIS2
Mastering Aggregation Functions in Kusto Query Language (KQL)
Finding Joy in the Simple Things: A Reflection on Ecclesiastes 2:24
The Business Case for Cybersecurity
Exploring Kusto.Cli: A Command-Line Utility for Kusto Query Language
A Deep Dive into the KQL Join Operator
AI versus Inanimate Objects: A Battle of Wits (Or Lack Thereof)
Using KQL to Optimize Alert Response
After the Blog Episode 21: Security Copilot Overage SCUs
Navigating the Transition to Overage SCUs in Microsoft Security Copilot
Using KQL to Track System Vulnerabilities
Seeking Wisdom: A Reflection on James 1:5
Using KQL to Enhance Threat Detection
Summarize active Defender for Endpoint alerts categorized as critical severity.
Using KQL to Identify Suspicious Behavior
The Power of Storytelling in Professional Branding: Crafting a Compelling Narrative
Leveraging KQL to Analyze Malware Trends and Identify Recurring Threats
Leveraging AI and Automation to Supercharge Your Professional Growth
Fine-Tuning KQL Query Performance: Best Practices
From Productivity to Impact: Rethinking Success in Your Career
Exploring Data Security Posture Management (DSPM) within Microsoft Purview
The Art of Influence: Building Meaningful Connections and Leading Without Authority
The Power of Words: Living Out Ephesians 4:29 in the Digital Age
Mastering Strategic Thinking: How to Elevate Your Decision-Making in the Workplace
Data Governance Meets AI: How Microsoft Purview is Transforming Compliance
After the Blog Episode 20: Data Governance Myths
The Art of Breaking Down Data Silos
Finding Clarity: The Art of Prioritizing What Truly Matters
Unlocking Seamless AI Integration
Gracious Words: Sweetness for the Soul, Healing for the Workplace
Data Governance Myths: Dispel Common Misconceptions
Who does it better? Or Worse? Generative AI for KQL
Rod's Blog Update April 15, 2025
Exploring the Different Areas of Microsoft Purview
Why 100% Security Doesn’t Exist
The Real Costs of Cloud Computing
Implementing Microsoft Purview: Best Practices for Effective Data Governance
What are the true benefits of Microsoft Purview?
Exploring the Model Context Protocol (MCP): A Cornerstone for AI Interoperability
Proverbs 22:29 and Its Relevance in the Modern Workplace
Mastering the Art of Closing the Deal During Interviews
Exploring the Diverse Roles in Cybersecurity
Security Copilot Prompt of the Day: Generate an incident report for incident <incident_number>.
Technology Careers: Thriving Roles in a Digitized World
Reflections on Microsoft's 50th Anniversary: A Journey Through Innovation and Community
Security Copilot Prompt of the Day: Get Warranty Coverage report for Surface Devices.
Overage SCUs Now Available for Security Copilot
The Unsung Hero: The Importance of Replacing the Empty Toilet Paper Roll
After the Blog Episode 19: ThreatIntelligenceIndicator Retirement
Rod's Blog Update April 2, 2025
Integrity in Action: Lessons from Proverbs 11:1
Alert: ThreatIntelligenceIndicator Table Retirement
Microsoft’s Epic Rebranding Extravaganza
The Top Habits of Highly Successful IT Professionals
Because Two Isn't Enough: The Dawn of 3FA and Beyond!
Introducing Microsoft Security Copilot 2.0: Now with Psychic Threat Detection!
Security Copilot Prompt of the Day: Identify gaps in our GDPR compliance.
Fostering Communication Instead of Cancellation in the IT Pro Community
Revitalize Your Work Life: Changing Daily Habits to Make Your Job Feel New
The Power of Participation: Why IT Pros Join Communities
Security Copilot Prompt of the Day: What groups is <username> assigned to?
Navigating Workplace Challenges: Handling Character Attacks with Grace
Unlocking the Potential of AI Agents for Automating Security
Embracing Transformation: A Reflection on Ephesians 4:28
Rediscovering the Lost Art of Community
Security Copilot Prompt of the Day: Triage the most recent Purview alerts.
Agentic AI and Microsoft Security Copilot
Spotting the Difference: When Generative AI is Creative vs. Just Wrong
Responding Respectfully and Appropriately in IT Pro Communities
Turning Negatives into Positives in an IT Pro Community
Security Copilot Prompt of the Day: How do I setup a DLP policy?
The Hilariously Terrifying Scenarios of Agentic AI Gone Wrong
Security Copilot Prompt of the Day: How do I fix issues with automatic labeling in MIP?
Exploring the Microsoft Security Copilot Logic Apps Connector
The Power of Outreach: Engaging Where Your Community Already Exists
Must Learn KQL Part 21: Maximizing Your Use of Kusto Query Language (KQL) - Tips, Tricks, and Tools
Embracing Personal Responsibility for a Healthier Online Experience
How Agentic AI Can Revolutionize Security Operations
Finding Contentment: A Journey of Practice and Faith
The Power of Running: Why Dedication to Running Makes for Exceptional IT and Security Professionals
The Future of IT Professionals in an AI-Driven World
Major Update to the "Developing Better Prompts for Microsoft Security Copilot" Workshop
Maximizing Your Insight: Subscribing to Alerts on Your Organization's Careers Site
Rod's ELDK 2025 Photos Gallery
The Technology Behind Generative AI
Transforming Work into Worship
Understanding Cybersecurity Threats
Empowering IT Pros: Strategies for Providing Continuous Learning and Development Opportunities
Zero Trust Architecture: Building a Security Model for the Modern Enterprise
Thriving in a Workplace Where Complainers Get Ahead
Walking in Integrity: A Professional's Devotion
The Human Factor: Understanding Social Engineering Attacks and How to Prevent Them
Building a Strong IT Community
Mastering Work-Life Balance: Strategies for Staying Productive and Happy
Live with Rod Trent - February 21, 2025
Building a Valuable Community through Professional Connections
Breaking Free: Managing Feeling Typecast and Underutilized in Your Job
Security Copilot Prompt of the Day: List all Sentinel workspaces.
Diligence and Contentment in God's Provision
Security Copilot Prompt of the Day: Have any users NOT been prompted for MFA in the last 48 hours?
The Evolution of Workspaces: Navigating the Cycles of Change
The Importance of Community for IT Pros and Professional Advancement
Embracing Remote Work: Best Practices for Staying Engaged and Effective
The Perils of Participating in Echo Chambers in Business
Rod Trent's Monday Minutes for February 17, 2025
Networking Like a Pro: Tips for Building and Maintaining Valuable Connections
Reviving the myITforum Community and Newsletter Through LinkedIn: A New Chapter
Reinforcing Positive Feedback: Transforming Workplace Culture
Navigating Career Transitions: How to Successfully Change Roles or Industries
From Sitting Too Much to Walking While Working
Rod Trent's Monday Minutes for February 10, 2025
Embrace the Power of a Growth Mindset for Professional Success
The Data Flow for Security Copilot
The Know-It-All vs. The Learn-It-All: Navigating Professional Growth
Security Copilot Prompt of the Day: Which threat actors are targeting the Finance industry.
Exploring Privacy-Enhancing Technologies (PETs)
Cybersecurity Mesh Architecture: Building a Flexible and Collaborative Security Ecosystem
Rod Trent's Monday Minutes for February 3, 2025
The Evolution of Ransomware and Regulatory Changes
Security Copilot Prompt of the Day: When did the user <username> last change their password?
Protecting Your Personal Data Privacy
Rod Trent's Monday Minutes for January 27, 2025
How to Protect Your Smart Home from Cyber Attacks
Security Copilot Prompt of the Day: Show me the authentication methods enabled for user <user name>
Cyber Hygiene for Remote Workers
The Pithy Guides: Your Shortcuts to Mastery
The Role of Cybersecurity in Maintaining Work-Life Balance
Security Copilot Prompt of the Day: What groups is Microsoft Monitoring Agent assigned to?
Digital Detox: How to Stay Safe Online While Taking Breaks from Technology
Give me the status of the <devicename>. Is it managed, is it compliant with management policies?
Top 10 Cybersecurity Life Hacks for Your Daily Routine
Curating Your Social Media Feed: A Personal Responsibility
Rod Trent's Monday Minutes for January 20, 2025
Hidden Dangers of Home Technology: Protecting Your Work Data and Devices
Creating Custom Microsoft Sentinel Data Connectors Using Functions
After the Blog Episode 18: The Cybersecurity Bell Curve and Generative AI
Locking Down Security for PowerShell: Best Practices and Strategies
Security Copilot Prompt of the Day: What are the best practices for securing data in Microsoft 365?
After the Blog Episode 17: Using a Samsung Tablet as a Second Screen
The Rising Threat of Smart Home Device Attacks
Rod Trent's Monday Minutes for January 13, 2025
Saving Your Best Prompts for Future Use
After the Blog Episode 16: Welcome to 2025
Embracing the Future: How to Go Passwordless
Why Professional Connections Matter in 2025
Connecting with the Microsoft Security Copilot Learning and Community
Leveraging Social Media Networks for Professional Success in 2025
How to Become More Organized at Work in 2025
Security Copilot Prompt of the Day: Suggest best practices for improving our email security.