Azure-Sentinel/Hunting Queries
ANISH BHOWMICK 87a249b0ba
added metadata
2024-11-08 14:07:07 +05:30
..
ASimProcess
ASimRegistry
AWSCloudTrail
AuditLogs Updated ApprovedAccessPackagesDetails.yaml 2024-07-20 11:41:38 +01:00
AzureActivity
AzureDevOpsAuditing
AzureDiagnostics
AzureStorage
BehaviorAnalytics
CloudAppEvents Added strong identifiers in mappings, projected more values, small corrections 2024-03-26 16:48:47 -07:00
CommonSecurityLog
DeviceProcess added metadata 2024-11-08 14:07:07 +05:30
DnsEvents
GitHub
LAQueryLogs
Microsoft 365 Defender Adding queries to look for abnormal sch task creation and launch 2024-10-06 14:57:52 +03:00
MultipleDataSources Query added in HighRiskSignInAroundAuthMethodOrDeviceRegistration.yaml 2024-08-12 19:32:22 +01:00
OfficeActivity
ProofpointPOD
SQLServer
SecurityAlert
SecurityEvent
SigninLogs Revert "Repackaging BusineessEmail Solution" 2024-03-04 19:39:25 +05:30
Syslog
ThreatIntelligenceIndicator
W3CIISLog
WireData
ZoomLogs
QUERY_TEMPLATE.md
readme.md

readme.md

About

This folder contains Hunting Queries based on different types of data sources that you can leverage in order to perform broad threat hunting in your environment.

For general information please start with the Wiki pages.

More Specific to Hunting Queries:

Feedback

For questions or feedback, please contact AzureSentinel@microsoft.com