KQL Samples

Some may be analytics rules, some may be just something I was looking for.

Lots of stuff learned from https://learnsentinel.blog so make sure you check it out! Awesome dude who is also very active on twitter https://twitter.com/reprise_99 and Github https://github.com/reprise99

Check for processname within accountdomain

// Check for process RDCMan in "FunkyDomain"
DeviceProcessEvents
| where AccountDomain == "FunkyDomain"
| where FileName has "RDCMan"

Failed logins in Azure

Timechart

// Failed logins to Azure, timechart
SigninLogs
| where TimeGenerated > ago(14d)
| where ResultType in ("50126", "50053" , "50055", "50056")
// 50053 Account is locked because the user tried to sign in too many times with an incorrect user ID or password. 
// 50055 Invalid password, entered expired password. 
// 50056 Invalid or null password - Password does not exist in store for this user. 
// 50126 Invalid username or password, or invalid on-premises username or password.
| summarize Count=count() by bin(TimeGenerated, 1h)
| render timechart 

Table


Finding changed permissions in a sharepoint site


Sentinel Table Growth

Takes all tables into account

Takes only SecurityEvent and Signinlogs into account


Find computer/user who connected to an IP


Extracting applocker events


Finding sysmonlogs


Finding SMBv1 audit data (if you have enabled auditing!)


MDE billable data

This should (I think) all Microsoft Defender for Endpoint/Server related tables - may be wrong...


Find all wifi SSID names people have connected to

For fun...

Last updated