📢 The near real-time frequency for custom detection rules with advanced hunting is now available in preview. The updated documentation highlights the tables supported for continuous rule detection:

learn.microsoft.com/en-us/micr

#microsoft365defender #advancedhunting

Last updated 2 years ago

F0rm4t · @F0rm4t
31 followers · 33 posts · Server infosec.exchange

Hunting - Office 365 Unified Audit Log

"This is a key data source in any cloud investigation because it contains a record of all the activity that has occurred in Office 365 and Azure Active Directory."

"If we use this resource correctly, it can help us build a full story of a threat actor’s activity in Office 365."

techcommunity.microsoft.com/t5

#hunting #advancedhunting #office365 #microsoft365 #sentinel #MicrosoftSentinel #casb #xdr #azure #microsoft #microsoftsecurity #audit #UAL #azureactivedirectory #exchange #onedrive #defenderforcloudapps #siem #soar #cloud #cloudsecrity #data #KQL

Last updated 3 years ago

He who hogs hedges · @pshef
24 followers · 53 posts · Server infosec.exchange

So is officially part of now, I found the files on a few computers. But, to my major disappointment, you can't interact with the logs at all. Not that I'm finding, at least. I was hoping that I could export the logs into or but it's looking like I'll still have to install zeek a second time for that to happen. I can't even find the zeek logs in ...

#zeek #defender #rita #achunter #advancedhunting

Last updated 3 years ago

· @ISO8601
3 followers · 5 posts · Server infosec.exchange

Who has been clicking on Windows tray notifications & what's the url?

DeviceProcessEvents
| where FileName in~ ("msedge.exe","chrome.exe") and ProcessCommandLine has ("--notification-launch-id")
| extend u=tostring(split(ProcessCommandLine,"|",4)[0])
| where u startswith "http"
| distinct u,AccountUpn,DeviceName,FileName,DeviceId

#defender #advancedhunting #malvertising

Last updated 3 years ago