9ac3464878 | ||
---|---|---|
.. | ||
Readme.md | ||
SQL-Failed SQL Logons.yaml | ||
SQL-MultipleFailedLogon_FromSameIP.yaml | ||
SQL-MultipleFailedLogon_InShortSpan.yaml | ||
SQL-New_UserCreated.yaml | ||
SQL-UserAdded_to_SecurityAdmin.yaml | ||
SQL-UserDeletedFromDatabase.yaml | ||
SQL-UserRemovedFromSecurityAdmin.yaml | ||
SQL-UserRemovedFromServerRole.yaml | ||
SQL-UserRoleChanged.yaml |
Readme.md
All these hunting queries are based on the SQLEvent KQL Parser function (link below) SQLEvent KQL Parser provided at https://github.com/Azure/Azure-Sentinel/tree/master/Parsers/SQLSever Detailed blog post on Monitoring SQL Server with Azure Sentinel https://techcommunity.microsoft.com/t5/azure-sentinel/monitoring-sql-server-with-azure-sentinel/ba-p/1502960