Skip to content

Latest commit

 

History

History
372 lines (336 loc) · 81.9 KB

DataQueries.rst

File metadata and controls

372 lines (336 loc) · 81.9 KB

Data Queries Reference

Queries for Microsoft Sentinel

Data Environment identifier: MSSentinel

QueryGroup Query Description Req-Params Table
Azure get_vmcomputer_for_host Gets latest VMComputer record for Host end (datetime), host_name (str), start (datetime) VMComputer
Azure get_vmcomputer_for_ip Gets latest VMComputer record for IPAddress end (datetime), ip_address (str), start (datetime) VMComputer
Azure list_aad_signins_for_account Lists Azure AD Signins for Account end (datetime), start (datetime) SigninLogs
Azure list_aad_signins_for_ip Lists Azure AD Signins for an IP Address end (datetime), ip_address_list (list), start (datetime) SigninLogs
Azure list_all_signins_geo Gets Signin data used by morph charts end (datetime), start (datetime) SigninLogs
Azure list_azure_activity_for_account Lists Azure Activity for Account account_name (str), end (datetime), start (datetime) AzureActivity
Azure list_azure_activity_for_ip Lists Azure Activity for Caller IP Address(es) end (datetime), ip_address_list (list), start (datetime) AzureActivity
Azure list_azure_activity_for_resource Lists Azure Activity for a Resource end (datetime), resource_id (str), start (datetime) AzureActivity
Azure list_storage_ops_for_hash no description end (datetime), file_hash (str), start (datetime) StorageFileLogs
Azure list_storage_ops_for_ip no description end (datetime), ip_address (str), start (datetime) StorageFileLogs
AzureNetwork az_net_analytics All Azure Network Analytics Data end (datetime), start (datetime) AzureNetworkAnalytics_CL
AzureNetwork dns_lookups_for_domain Dns queries for a domain domain (str), end (datetime), start (datetime) DnsEvents
AzureNetwork dns_lookups_for_ip Dns queries for a domain end (datetime), ip_address (str), start (datetime) DnsEvents
AzureNetwork dns_lookups_from_ip Dns queries for a domain end (datetime), ip_address (str), start (datetime) DnsEvents
AzureNetwork get_heartbeat_for_host Retrieves latest OMS Heartbeat event for host. end (datetime), host_name (str), start (datetime) Heartbeat
AzureNetwork get_heartbeat_for_ip Retrieves latest OMS Heartbeat event for ip address. end (datetime), ip_address (str), start (datetime) Heartbeat
AzureNetwork get_host_for_ip Gets the latest AzureNetworkAnalytics interface event for a host. end (datetime), ip_address (str), start (datetime) AzureNetworkAnalytics_CL
AzureNetwork get_ips_for_host Gets the latest AzureNetworkAnalytics interface event for a host. end (datetime), host_name (str), start (datetime) AzureNetworkAnalytics_CL
AzureNetwork list_azure_network_flows_by_host Retrieves Azure network analytics flow events. end (datetime), host_name (str), start (datetime) AzureNetworkAnalytics_CL
AzureNetwork list_azure_network_flows_by_ip Retrieves Azure network analytics flow events. end (datetime), ip_address_list (list), start (datetime) AzureNetworkAnalytics_CL
AzureNetwork network_connections_to_url List of network connections to a URL end (datetime), start (datetime), url (str) -
AzureSentinel get_bookmark_by_id Retrieves a single Bookmark by BookmarkId bookmark_id (str), end (datetime), start (datetime) HuntingBookmark
AzureSentinel get_bookmark_by_name Retrieves one or more Bookmarks by Bookmark Name bookmark_name (str), end (datetime), start (datetime) HuntingBookmark
AzureSentinel list_bookmarks Retrieves list of bookmarks end (datetime), start (datetime) HuntingBookmark
AzureSentinel list_bookmarks_for_entity Retrieves bookmarks for entity string end (datetime), start (datetime) HuntingBookmark
AzureSentinel list_bookmarks_for_tags Retrieves Bookmark by one or mare Tags bookmark_tags (list), end (datetime), start (datetime) HuntingBookmark
Heartbeat get_heartbeat_for_host Retrieves latest OMS Heartbeat event for host. end (datetime), host_name (str), start (datetime) Heartbeat
Heartbeat get_heartbeat_for_ip Retrieves latest OMS Heartbeat event for ip address. end (datetime), ip_address (str), start (datetime) Heartbeat
Heartbeat get_info_by_hostname Deprecated - use 'get_heartbeat_for_host' end (datetime), host_name (str), start (datetime) Heartbeat
Heartbeat get_info_by_ipaddress Deprecated - use 'get_heartbeat_for_ip' end (datetime), ip_address (str), start (datetime) Heartbeat
LinuxAudit auditd_all Extract all audit messages grouped by mssg_id end (datetime), start (datetime) AuditLog_CL
LinuxSyslog all_syslog Returns all syslog activity for a host end (datetime), start (datetime) Syslog
LinuxSyslog cron_activity All cron activity end (datetime), start (datetime) Syslog
LinuxSyslog list_account_logon_failures All failed user logon events from an IP address account_name (str), end (datetime), start (datetime) Syslog
LinuxSyslog list_host_logon_failures All failed user logon events on a host end (datetime), host_name (str), start (datetime) Syslog
LinuxSyslog list_ip_logon_failures All failed user logon events from an IP address end (datetime), ip_address (str), start (datetime) Syslog
LinuxSyslog list_logon_failures All failed user logon events on any host end (datetime), start (datetime) Syslog
LinuxSyslog list_logons_for_account All successful user logon events for account (all hosts) account_name (str), end (datetime), start (datetime) Syslog
LinuxSyslog list_logons_for_host All logon events on a host end (datetime), host_name (str), start (datetime) Syslog
LinuxSyslog list_logons_for_source_ip All successful user logon events for source IP (all hosts) end (datetime), ip_address (str), start (datetime) Syslog
LinuxSyslog notable_events Returns all syslog activity for a host end (datetime), start (datetime) Syslog
LinuxSyslog squid_activity All squid proxy activity end (datetime), host_name (str), start (datetime) Syslog
LinuxSyslog sudo_activity All sudo activity end (datetime), start (datetime) Syslog
LinuxSyslog summarize_events Returns all syslog activity for a host end (datetime), start (datetime) Syslog
LinuxSyslog sysmon_process_events Get Process Events from a specified host end (datetime), host_name (str), start (datetime) -
LinuxSyslog user_group_activity All user/group additions, deletions, and modifications end (datetime), start (datetime) Syslog
LinuxSyslog user_logon All user logon events on a host end (datetime), host_name (str), start (datetime) Syslog
MDATP file_path Lists all file events from files in a certain path end (datetime), path (str), start (datetime) DeviceProcessEvents
MDATP host_connections Lists connections by for a specified hostname end (datetime), host_name (str), start (datetime) DeviceNetworkEvents
MDATP ip_connections Lists network connections associated with a specified remote IP end (datetime), ip_address (str), start (datetime) DeviceNetworkEvents
MDATP list_connections Retrieves list of all network connections end (datetime), start (datetime) DeviceNetworkEvents
MDATP list_filehash Lists all file events by hash end (datetime), file_hash (str), start (datetime) DeviceProcessEvents
MDATP list_files Lists all file events by filename end (datetime), file_name (str), start (datetime) DeviceProcessEvents
MDATP list_host_processes Lists all process creations for a host end (datetime), host_name (str), start (datetime) DeviceProcessEvents
MDATP process_cmd_line Lists all processes with a command line containing a string cmd_line (str), end (datetime), start (datetime) DeviceProcessEvents
MDATP process_creations Lists all processes created by name or hash end (datetime), process_identifier (str), start (datetime) DeviceProcessEvents
MDATP process_paths Lists all processes created from a path end (datetime), file_path (str), start (datetime) DeviceProcessEvents
MDATP protocol_connections Lists connections associated with a specified protocol end (datetime), protocol (str), start (datetime) DeviceNetworkEvents
MDATP url_connections Lists connections associated with a specified URL end (datetime), start (datetime), url (str) DeviceNetworkEvents
MDATP user_files Lists all files created by a user account_name (str), end (datetime), start (datetime) -
MDATP user_logons Lists all user logons by user account_name (str), end (datetime), start (datetime) -
MDATP user_network Lists all network connections associated with a user account_name (str), end (datetime), start (datetime) -
MDATP user_processes Lists all processes created by a user account_name (str), end (datetime), start (datetime) -
MDATPHunting accessibility_persistence This query looks for persistence or privilege escalation done using Windows Accessibility features. end (datetime), start (datetime) -
MDATPHunting av_sites Pivot from downloads detected by Windows Defender Antivirus to other files downloaded from the same sites end (datetime), start (datetime) -
MDATPHunting b64_pe Finding base64 encoded PE files header seen in the command line parameters end (datetime), start (datetime) -
MDATPHunting brute_force Look for public IP addresses that failed to logon to a computer multiple times, using multiple accounts, and eventually succeeded. end (datetime), start (datetime) -
MDATPHunting cve_2018_1000006l Looks for CVE-2018-1000006 exploitation end (datetime), start (datetime) -
MDATPHunting cve_2018_1111 Looks for CVE-2018-1111 exploitation end (datetime), start (datetime) -
MDATPHunting cve_2018_4878 This query checks for specific processes and domain TLD used in the CVE-2018-4878 end (datetime), start (datetime) -
MDATPHunting doc_with_link Looks for a Word document attachment, from which a link was clicked, and after which there was a browser download. end (datetime), start (datetime) -
MDATPHunting dropbox_link Looks for user content downloads from dropbox that originate from a link/redirect from a 3rd party site. end (datetime), start (datetime) -
MDATPHunting email_link Look for links opened from mail apps – if a detection occurred right afterwards end (datetime), start (datetime) -
MDATPHunting email_smartscreen Look for links opened from outlook.exe, followed by a browser download and then a SmartScreen app warning end (datetime), start (datetime) -
MDATPHunting malware_recycle Finding attackers hiding malware in the recycle bin. end (datetime), start (datetime) -
MDATPHunting network_scans Looking for high volume queries against a given RemoteIP, per ComputerName, RemotePort and Process end (datetime), start (datetime) -
MDATPHunting powershell_downloads Finds PowerShell execution events that could involve a download. end (datetime), start (datetime) -
MDATPHunting service_account_powershell Service Accounts Performing Remote PowerShell end (datetime), start (datetime) -
MDATPHunting smartscreen_ignored Query for SmartScreen URL blocks, where the user has decided to run the malware nontheless. end (datetime), start (datetime) -
MDATPHunting smb_discovery Query for processes that accessed more than 10 IP addresses over port 445 (SMB) - possibly scanning for network shares. end (datetime), start (datetime) -
MDATPHunting tor Looks for Tor client, or for a common Tor plugin called Meek. end (datetime), start (datetime) -
MDATPHunting uncommon_powershell Find which uncommon Powershell Cmdlets were executed on that machine in a certain time period. end (datetime), host_name (str), start (datetime), timestamp (str) -
MDATPHunting user_enumeration The query finds attempts to list users or groups using Net commands end (datetime), start (datetime) -
MDE accessibility_persistence This query looks for persistence or privilege escalation done using Windows Accessibility features. end (datetime), start (datetime) -
MDE av_sites Pivot from downloads detected by Windows Defender Antivirus to other files downloaded from the same sites end (datetime), start (datetime) -
MDE b64_pe Finding base64 encoded PE files header seen in the command line parameters end (datetime), start (datetime) -
MDE brute_force Look for public IP addresses that failed to logon to a computer multiple times, using multiple accounts, and eventually succeeded. end (datetime), start (datetime) -
MDE cve_2018_1000006l Looks for CVE-2018-1000006 exploitation end (datetime), start (datetime) -
MDE cve_2018_1111 Looks for CVE-2018-1111 exploitation end (datetime), start (datetime) -
MDE cve_2018_4878 This query checks for specific processes and domain TLD used in the CVE-2018-4878 end (datetime), start (datetime) -
MDE doc_with_link Looks for a Word document attachment, from which a link was clicked, and after which there was a browser download. end (datetime), start (datetime) -
MDE dropbox_link Looks for user content downloads from dropbox that originate from a link/redirect from a 3rd party site. end (datetime), start (datetime) -
MDE email_link Look for links opened from mail apps – if a detection occurred right afterwards end (datetime), start (datetime) -
MDE email_smartscreen Look for links opened from outlook.exe, followed by a browser download and then a SmartScreen app warning end (datetime), start (datetime) -
MDE file_path Lists all file events from files in a certain path end (datetime), path (str), start (datetime) DeviceProcessEvents
MDE host_connections Lists connections by for a specified hostname end (datetime), host_name (str), start (datetime) DeviceNetworkEvents
MDE ip_connections Lists network connections associated with a specified remote IP end (datetime), ip_address (str), start (datetime) DeviceNetworkEvents
MDE list_connections Retrieves list of all network connections end (datetime), start (datetime) DeviceNetworkEvents
MDE list_filehash Lists all file events by hash end (datetime), file_hash (str), start (datetime) DeviceProcessEvents
MDE list_files Lists all file events by filename end (datetime), file_name (str), start (datetime) DeviceProcessEvents
MDE list_host_processes Lists all process creations for a host end (datetime), host_name (str), start (datetime) DeviceProcessEvents
MDE malware_recycle Finding attackers hiding malware in the recycle bin. end (datetime), start (datetime) -
MDE network_scans Looking for high volume queries against a given RemoteIP, per ComputerName, RemotePort and Process end (datetime), start (datetime) -
MDE powershell_downloads Finds PowerShell execution events that could involve a download. end (datetime), start (datetime) -
MDE process_cmd_line Lists all processes with a command line containing a string cmd_line (str), end (datetime), start (datetime) DeviceProcessEvents
MDE process_creations Lists all processes created by name or hash end (datetime), process_identifier (str), start (datetime) DeviceProcessEvents
MDE process_paths Lists all processes created from a path end (datetime), file_path (str), start (datetime) DeviceProcessEvents
MDE protocol_connections Lists connections associated with a specified protocol end (datetime), protocol (str), start (datetime) DeviceNetworkEvents
MDE service_account_powershell Service Accounts Performing Remote PowerShell end (datetime), start (datetime) -
MDE smartscreen_ignored Query for SmartScreen URL blocks, where the user has decided to run the malware nontheless. end (datetime), start (datetime) -
MDE smb_discovery Query for processes that accessed more than 10 IP addresses over port 445 (SMB) - possibly scanning for network shares. end (datetime), start (datetime) -
MDE tor Looks for Tor client, or for a common Tor plugin called Meek. end (datetime), start (datetime) -
MDE uncommon_powershell Find which uncommon Powershell Cmdlets were executed on that machine in a certain time period. end (datetime), host_name (str), start (datetime), timestamp (str) -
MDE url_connections Lists connections associated with a specified URL end (datetime), start (datetime), url (str) DeviceNetworkEvents
MDE user_enumeration The query finds attempts to list users or groups using Net commands end (datetime), start (datetime) -
MDE user_files Lists all files created by a user account_name (str), end (datetime), start (datetime) -
MDE user_logons Lists all user logons by user account_name (str), end (datetime), start (datetime) -
MDE user_network Lists all network connections associated with a user account_name (str), end (datetime), start (datetime) -
MDE user_processes Lists all processes created by a user account_name (str), end (datetime), start (datetime) -
MultiDataSource get_timeseries_anomalies Time Series filtered anomalies detected using built-in KQL time series function-series_decompose_anomalies end (datetime), start (datetime), table (str) na
MultiDataSource get_timeseries_data Retrieves TimeSeriesData prepared to use with built-in KQL time series functions end (datetime), start (datetime), table (str) na
MultiDataSource get_timeseries_decompose Time Series decomposition and anomalies generated using built-in KQL time series function- series_decompose end (datetime), start (datetime), table (str) na
MultiDataSource plot_timeseries_datawithbaseline Plot timeseries data using built-in KQL time series decomposition using built-in KQL render method end (datetime), start (datetime), table (str) na
MultiDataSource plot_timeseries_scoreanomolies Plot timeseries anomaly score using built-in KQL render method end (datetime), start (datetime), table (str) na
Network get_heartbeat_for_host Retrieves latest OMS Heartbeat event for host. end (datetime), host_name (str), start (datetime) Heartbeat
Network get_heartbeat_for_ip Retrieves latest OMS Heartbeat event for ip address. end (datetime), ip_address (str), start (datetime) Heartbeat
Network get_host_for_ip Gets the latest AzureNetworkAnalytics interface event for a host. end (datetime), ip_address (str), start (datetime) AzureNetworkAnalytics_CL
Network get_ips_for_host Gets the latest AzureNetworkAnalytics interface event for a host. end (datetime), host_name (str), start (datetime) AzureNetworkAnalytics_CL
Network list_azure_network_flows_by_host Retrieves Azure network analytics flow events. end (datetime), host_name (str), start (datetime) AzureNetworkAnalytics_CL
Network list_azure_network_flows_by_ip Retrieves Azure network analytics flow events. end (datetime), ip_address_list (list), start (datetime) AzureNetworkAnalytics_CL
Network network_connections_to_url List of network connections to a URL end (datetime), start (datetime), url (str) -
Office365 list_activity_for_account Lists Office Activity for Account account_name (str), end (datetime), start (datetime) OfficeActivity
Office365 list_activity_for_ip Lists Office Activity for Caller IP Address(es) end (datetime), ip_address_list (list), start (datetime) OfficeActivity
Office365 list_activity_for_resource Lists Office Activity for a Resource end (datetime), resource_id (str), start (datetime) OfficeActivity
SecurityAlert get_alert Retrieves a single alert by SystemAlertId system_alert_id (str) SecurityAlert
SecurityAlert list_alerts Retrieves list of alerts end (datetime), start (datetime) SecurityAlert
SecurityAlert list_alerts_counts Retrieves summary count of alerts by type end (datetime), start (datetime) SecurityAlert
SecurityAlert list_alerts_for_ip Retrieves list of alerts with a common IP Address end (datetime), source_ip_list (str), start (datetime) SecurityAlert
SecurityAlert list_related_alerts Retrieves list of alerts with a common host, account or process end (datetime), start (datetime) SecurityAlert
ThreatIntelligence list_indicators Retrieves list of all current indicators. end (datetime), start (datetime) ThreatIntelligenceIndicator
ThreatIntelligence list_indicators_by_domain Retrieves list of indicators by domain domain_list (list), end (datetime), start (datetime) ThreatIntelligenceIndicator
ThreatIntelligence list_indicators_by_email Retrieves list of indicators by email address end (datetime), observables (list), start (datetime) ThreatIntelligenceIndicator
ThreatIntelligence list_indicators_by_filepath Retrieves list of indicators by file path end (datetime), observables (list), start (datetime) ThreatIntelligenceIndicator
ThreatIntelligence list_indicators_by_hash Retrieves list of indicators by file hash end (datetime), file_hash_list (list), start (datetime) ThreatIntelligenceIndicator
ThreatIntelligence list_indicators_by_ip Retrieves list of indicators by IP Address end (datetime), ip_address_list (list), start (datetime) ThreatIntelligenceIndicator
ThreatIntelligence list_indicators_by_url Retrieves list of indicators by URL end (datetime), start (datetime), url_list (list) ThreatIntelligenceIndicator
WindowsSecurity account_change_events Gets events related to account changes end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity get_host_logon Retrieves the logon event for the session id on the host end (datetime), host_name (str), logon_session_id (str), start (datetime) SecurityEvent
WindowsSecurity get_parent_process Retrieves the parent process of a supplied process end (datetime), host_name (str), logon_session_id (str), process_id (str), process_name (str), start (datetime) SecurityEvent
WindowsSecurity get_process_tree Retrieves the process tree of a supplied process end (datetime), host_name (str), logon_session_id (str), process_id (str), process_name (str), start (datetime) SecurityEvent
WindowsSecurity list_all_logons_by_host account all failed or successful logons to a host end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity list_events Retrieves list of all events end (datetime), start (datetime) SecurityEvent
WindowsSecurity list_events_by_id Retrieves list of events on a host end (datetime), event_list (list), start (datetime) SecurityEvent
WindowsSecurity list_host_events Retrieves list of all events on a host end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity list_host_events_by_id Retrieves list of events on a host end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity list_host_logon_failures Retrieves the logon failure events on the host end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity list_host_logons Retrieves the logon events on the host end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity list_host_processes Retrieves list of processes on a host end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity list_hosts_matching_commandline Retrieves processes on hosts with matching commandline commandline (str), end (datetime), process_name (str), start (datetime) SecurityEvent
WindowsSecurity list_logon_attempts_by_account Retrieves the logon events for an account account_name (str), end (datetime), start (datetime) SecurityEvent
WindowsSecurity list_logon_attempts_by_ip Retrieves the logon events for an IP Address end (datetime), ip_address (str), start (datetime) SecurityEvent
WindowsSecurity list_logon_failures_by_account Retrieves the logon failure events for an account account_name (str), end (datetime), start (datetime) SecurityEvent
WindowsSecurity list_logons_by_account Retrieves the logon events for an account account_name (str), end (datetime), start (datetime) SecurityEvent
WindowsSecurity list_matching_processes Retrieves list of processes matching process name end (datetime), process_name (str), start (datetime) SecurityEvent
WindowsSecurity list_other_events Retrieves list of events other than logon and process on a host end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity list_processes_in_session Retrieves all processes on the host for a logon session end (datetime), host_name (str), logon_session_id (str), process_id (str), process_name (str), start (datetime) SecurityEvent
WindowsSecurity notable_events Get notebable Windows events not returned in other queries end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity schdld_tasks_and_services Gets events related to scheduled tasks and services end (datetime), host_name (str), start (datetime) SecurityEvent
WindowsSecurity summarize_events Summarizes a the events on a host end (datetime), host_name (str), start (datetime) SecurityEvent

Queries for Microsoft 365 Defender

Data Environment identifier: M365D

QueryGroup Query Description Req-Params Table
MDATP file_path Lists all file events from files in a certain path end (datetime), path (str), start (datetime) DeviceProcessEvents
MDATP host_alerts Lists alerts by for a specified hostname end (datetime), host_name (str), start (datetime) DeviceAlertEvents
MDATP host_connections Lists connections by for a specified hostname end (datetime), host_name (str), start (datetime) DeviceNetworkEvents
MDATP ip_alerts Lists alerts associated with a specified remote IP end (datetime), ip_address (str), start (datetime) DeviceAlertEvents
MDATP ip_connections Lists network connections associated with a specified remote IP end (datetime), ip_address (str), start (datetime) DeviceNetworkEvents
MDATP list_alerts Retrieves list of alerts end (datetime), start (datetime) DeviceAlertEvents
MDATP list_connections Retrieves list of all network connections end (datetime), start (datetime) DeviceNetworkEvents
MDATP list_filehash Lists all file events by hash end (datetime), file_hash (str), start (datetime) DeviceProcessEvents
MDATP list_files Lists all file events by filename end (datetime), file_name (str), start (datetime) DeviceProcessEvents
MDATP list_host_processes Lists all process creations for a host end (datetime), host_name (str), start (datetime) DeviceProcessEvents
MDATP process_cmd_line Lists all processes with a command line containing a string cmd_line (str), end (datetime), start (datetime) DeviceProcessEvents
MDATP process_creations Lists all processes created by name or hash end (datetime), process_identifier (str), start (datetime) DeviceProcessEvents
MDATP process_paths Lists all processes created from a path end (datetime), file_path (str), start (datetime) DeviceProcessEvents
MDATP protocol_connections Lists connections associated with a specified protocol end (datetime), protocol (str), start (datetime) DeviceNetworkEvents
MDATP sha1_alerts Lists alerts associated with a specified SHA1 hash end (datetime), file_hash (str), start (datetime) DeviceAlertEvents
MDATP url_alerts Lists alerts associated with a specified URL end (datetime), start (datetime), url (str) DeviceAlertEvents
MDATP url_connections Lists connections associated with a specified URL end (datetime), start (datetime), url (str) DeviceNetworkEvents
MDATP user_files Lists all files created by a user account_name (str), end (datetime), start (datetime) -
MDATP user_logons Lists all user logons by user account_name (str), end (datetime), start (datetime) -
MDATP user_network Lists all network connections associated with a user account_name (str), end (datetime), start (datetime) -
MDATP user_processes Lists all processes created by a user account_name (str), end (datetime), start (datetime) -
MDATPHunting accessibility_persistence This query looks for persistence or privilege escalation done using Windows Accessibility features. end (datetime), start (datetime) -
MDATPHunting av_sites Pivot from downloads detected by Windows Defender Antivirus to other files downloaded from the same sites end (datetime), start (datetime) -
MDATPHunting b64_pe Finding base64 encoded PE files header seen in the command line parameters end (datetime), start (datetime) -
MDATPHunting brute_force Look for public IP addresses that failed to logon to a computer multiple times, using multiple accounts, and eventually succeeded. end (datetime), start (datetime) -
MDATPHunting cve_2018_1000006l Looks for CVE-2018-1000006 exploitation end (datetime), start (datetime) -
MDATPHunting cve_2018_1111 Looks for CVE-2018-1111 exploitation end (datetime), start (datetime) -
MDATPHunting cve_2018_4878 This query checks for specific processes and domain TLD used in the CVE-2018-4878 end (datetime), start (datetime) -
MDATPHunting doc_with_link Looks for a Word document attachment, from which a link was clicked, and after which there was a browser download. end (datetime), start (datetime) -
MDATPHunting dropbox_link Looks for user content downloads from dropbox that originate from a link/redirect from a 3rd party site. end (datetime), start (datetime) -
MDATPHunting email_link Look for links opened from mail apps – if a detection occurred right afterwards end (datetime), start (datetime) -
MDATPHunting email_smartscreen Look for links opened from outlook.exe, followed by a browser download and then a SmartScreen app warning end (datetime), start (datetime) -
MDATPHunting malware_recycle Finding attackers hiding malware in the recycle bin. end (datetime), start (datetime) -
MDATPHunting network_scans Looking for high volume queries against a given RemoteIP, per ComputerName, RemotePort and Process end (datetime), start (datetime) -
MDATPHunting powershell_downloads Finds PowerShell execution events that could involve a download. end (datetime), start (datetime) -
MDATPHunting service_account_powershell Service Accounts Performing Remote PowerShell end (datetime), start (datetime) -
MDATPHunting smartscreen_ignored Query for SmartScreen URL blocks, where the user has decided to run the malware nontheless. end (datetime), start (datetime) -
MDATPHunting smb_discovery Query for processes that accessed more than 10 IP addresses over port 445 (SMB) - possibly scanning for network shares. end (datetime), start (datetime) -
MDATPHunting tor Looks for Tor client, or for a common Tor plugin called Meek. end (datetime), start (datetime) -
MDATPHunting uncommon_powershell Find which uncommon Powershell Cmdlets were executed on that machine in a certain time period. end (datetime), host_name (str), start (datetime), timestamp (str) -
MDATPHunting user_enumeration The query finds attempts to list users or groups using Net commands end (datetime), start (datetime) -
MDE accessibility_persistence This query looks for persistence or privilege escalation done using Windows Accessibility features. end (datetime), start (datetime) -
MDE av_sites Pivot from downloads detected by Windows Defender Antivirus to other files downloaded from the same sites end (datetime), start (datetime) -
MDE b64_pe Finding base64 encoded PE files header seen in the command line parameters end (datetime), start (datetime) -
MDE brute_force Look for public IP addresses that failed to logon to a computer multiple times, using multiple accounts, and eventually succeeded. end (datetime), start (datetime) -
MDE cve_2018_1000006l Looks for CVE-2018-1000006 exploitation end (datetime), start (datetime) -
MDE cve_2018_1111 Looks for CVE-2018-1111 exploitation end (datetime), start (datetime) -
MDE cve_2018_4878 This query checks for specific processes and domain TLD used in the CVE-2018-4878 end (datetime), start (datetime) -
MDE doc_with_link Looks for a Word document attachment, from which a link was clicked, and after which there was a browser download. end (datetime), start (datetime) -
MDE dropbox_link Looks for user content downloads from dropbox that originate from a link/redirect from a 3rd party site. end (datetime), start (datetime) -
MDE email_link Look for links opened from mail apps – if a detection occurred right afterwards end (datetime), start (datetime) -
MDE email_smartscreen Look for links opened from outlook.exe, followed by a browser download and then a SmartScreen app warning end (datetime), start (datetime) -
MDE file_path Lists all file events from files in a certain path end (datetime), path (str), start (datetime) DeviceProcessEvents
MDE host_connections Lists connections by for a specified hostname end (datetime), host_name (str), start (datetime) DeviceNetworkEvents
MDE ip_connections Lists network connections associated with a specified remote IP end (datetime), ip_address (str), start (datetime) DeviceNetworkEvents
MDE list_connections Retrieves list of all network connections end (datetime), start (datetime) DeviceNetworkEvents
MDE list_filehash Lists all file events by hash end (datetime), file_hash (str), start (datetime) DeviceProcessEvents
MDE list_files Lists all file events by filename end (datetime), file_name (str), start (datetime) DeviceProcessEvents
MDE list_host_processes Lists all process creations for a host end (datetime), host_name (str), start (datetime) DeviceProcessEvents
MDE malware_recycle Finding attackers hiding malware in the recycle bin. end (datetime), start (datetime) -
MDE network_scans Looking for high volume queries against a given RemoteIP, per ComputerName, RemotePort and Process end (datetime), start (datetime) -
MDE powershell_downloads Finds PowerShell execution events that could involve a download. end (datetime), start (datetime) -
MDE process_cmd_line Lists all processes with a command line containing a string cmd_line (str), end (datetime), start (datetime) DeviceProcessEvents
MDE process_creations Lists all processes created by name or hash end (datetime), process_identifier (str), start (datetime) DeviceProcessEvents
MDE process_paths Lists all processes created from a path end (datetime), file_path (str), start (datetime) DeviceProcessEvents
MDE protocol_connections Lists connections associated with a specified protocol end (datetime), protocol (str), start (datetime) DeviceNetworkEvents
MDE service_account_powershell Service Accounts Performing Remote PowerShell end (datetime), start (datetime) -
MDE smartscreen_ignored Query for SmartScreen URL blocks, where the user has decided to run the malware nontheless. end (datetime), start (datetime) -
MDE smb_discovery Query for processes that accessed more than 10 IP addresses over port 445 (SMB) - possibly scanning for network shares. end (datetime), start (datetime) -
MDE tor Looks for Tor client, or for a common Tor plugin called Meek. end (datetime), start (datetime) -
MDE uncommon_powershell Find which uncommon Powershell Cmdlets were executed on that machine in a certain time period. end (datetime), host_name (str), start (datetime), timestamp (str) -
MDE url_connections Lists connections associated with a specified URL end (datetime), start (datetime), url (str) DeviceNetworkEvents
MDE user_enumeration The query finds attempts to list users or groups using Net commands end (datetime), start (datetime) -
MDE user_files Lists all files created by a user account_name (str), end (datetime), start (datetime) -
MDE user_logons Lists all user logons by user account_name (str), end (datetime), start (datetime) -
MDE user_network Lists all network connections associated with a user account_name (str), end (datetime), start (datetime) -
MDE user_processes Lists all processes created by a user account_name (str), end (datetime), start (datetime) -

Queries for Microsoft Graph

Data Environment identifier: SecurityGraph

QueryGroup Query Description Req-Params Table
SecurityGraphAlert get_alert Retrieves a single alert by AlertId alert_id (str) -
SecurityGraphAlert list_alerts Retrieves list of alerts end (datetime), start (datetime) -
SecurityGraphAlert list_alerts_for_file Retrieves list of alerts for file name, path or hash end (datetime), start (datetime) -
SecurityGraphAlert list_alerts_for_host Retrieves list of alerts for a hostname or FQDN end (datetime), host_name (str), start (datetime) -
SecurityGraphAlert list_alerts_for_ip Retrieves list of alerts for a IP Address end (datetime), ip_address (str), start (datetime) -
SecurityGraphAlert list_alerts_for_user Retrieves list of alerts for a user account end (datetime), start (datetime) -
SecurityGraphAlert list_related_alerts Retrieves list of alerts with a common entity end (datetime), start (datetime) -

Queries for Splunk

Data Environment identifier: Splunk

QueryGroup Query Description Req-Params Table
Alerts list_alerts Retrieves list of alerts end (datetime), start (datetime) -
Alerts list_alerts_for_dest_ip Retrieves list of alerts with a common destination IP Address end (datetime), ip_address (str), start (datetime) -
Alerts list_alerts_for_src_ip Retrieves list of alerts with a common source IP Address end (datetime), ip_address (str), start (datetime) -
Alerts list_alerts_for_user Retrieves list of alerts with a common username end (datetime), start (datetime), user (str) -
Alerts list_all_alerts Retrieves all configured alerts end (datetime), start (datetime) -
Authentication list_logon_failures All failed user logon events on any host end (datetime), start (datetime) -
Authentication list_logons_for_account All successful user logon events for account (all hosts) account_name (str), end (datetime), start (datetime) -
Authentication list_logons_for_host All logon events on a host end (datetime), host_name (str), start (datetime) -
Authentication list_logons_for_source_ip All successful user logon events for source IP (all hosts) end (datetime), ip_address (str), start (datetime) -
SplunkGeneral get_events_parameterized Generic parameterized query from index/source end (datetime), start (datetime) -
SplunkGeneral list_all_datatypes Summary of all events by index and sourcetype end (datetime), start (datetime) -
SplunkGeneral list_all_savedsearches Retrieves all saved searches end (datetime), start (datetime) -
audittrail list_all_audittrail Retrieves all audit trail logs end (datetime), start (datetime) -

Queries for Azure Resource Graph

Data Environment identifier: ResourceGraph

QueryGroup Query Description Req-Params Table

ResourceGraph ResourceGraph ResourceGraph ResourceGraph

list_detailed_virtual_machines list_public_ips list_resources list_resources_by_api_version

Retrieves list of VMs with network details Retrieves list of resources with public IP addresses Retrieves list of resources Retrieves list of resources for each API version

resources resources resources resources

ResourceGraph ResourceGraph

list_resources_by_type list_virtual_machines

Retrieves list of resources by type Retrieves list of VM resources

resource_type (str)

resources resources

Sentinel get_sentinel_workspace_for_resource_id Retrieves Sentinel/Azure monitor workspace details by resource ID resource_id (str) resources
Sentinel get_sentinel_workspace_for_workspace_id Retrieves Sentinel/Azure monitor workspace details by workspace ID workspace_id (str) resources
Sentinel list_sentinel_workspaces_for_name Retrieves Sentinel/Azure monitor workspace(s) details by name and optionally resource group and/or subscription_id workspace_name (str) resources

Queries for Sumologic

Data Environment identifier: Sumologic

QueryGroup Query Description Req-Params Table
SumologicGeneral list_all_datatypes Summary of all events by sourceCategory end (datetime), start (datetime) -

Queries for Local Data

Data Environment identifier: LocalData

QueryGroup Query Description Req-Params Table

Azure Network Network SecurityAlert WindowsSecurity WindowsSecurity WindowsSecurity WindowsSecurity WindowsSecurity

list_all_signins_geo list_azure_network_flows_by_host list_azure_network_flows_by_ip list_alerts get_process_tree list_host_events list_host_logon_failures list_host_logons list_host_processes

List all Azure AD logon events List Azure Network flows by host name List Azure Network flows by IP address Retrieves list of alerts Get process tree for a process List events failures on host List logon failures on host List logons on host List processes on host