mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-30 22:27:23 +00:00
Add kusto languange name to AH code
This commit is contained in:
parent
8903076001
commit
4590a32343
@ -45,7 +45,7 @@ Process IDs (PIDs) are recycled in Windows and reused for new processes. On thei
|
|||||||
|
|
||||||
The following example query finds processes that access more than 10 IP addresses over port 445 (SMB), possibly scanning for file shares.
|
The following example query finds processes that access more than 10 IP addresses over port 445 (SMB), possibly scanning for file shares.
|
||||||
|
|
||||||
```
|
```kusto
|
||||||
DeviceNetworkEvents
|
DeviceNetworkEvents
|
||||||
| where RemotePort == 445 and Timestamp > ago(12h) and InitiatingProcessId !in (0, 4)
|
| where RemotePort == 445 and Timestamp > ago(12h) and InitiatingProcessId !in (0, 4)
|
||||||
| summarize RemoteIPCount=dcount(RemoteIP) by DeviceName, InitiatingProcessId, InitiatingProcessCreationTime, InitiatingProcessFileName
|
| summarize RemoteIPCount=dcount(RemoteIP) by DeviceName, InitiatingProcessId, InitiatingProcessCreationTime, InitiatingProcessFileName
|
||||||
@ -68,7 +68,7 @@ To create more durable queries using command lines, apply the following practice
|
|||||||
|
|
||||||
The following examples show various ways to construct a query that looks for the file *net.exe* to stop the Windows Defender Firewall service:
|
The following examples show various ways to construct a query that looks for the file *net.exe* to stop the Windows Defender Firewall service:
|
||||||
|
|
||||||
```
|
```kusto
|
||||||
// Non-durable query - do not use
|
// Non-durable query - do not use
|
||||||
DeviceProcessEvents
|
DeviceProcessEvents
|
||||||
| where ProcessCommandLine == "net stop MpsSvc"
|
| where ProcessCommandLine == "net stop MpsSvc"
|
||||||
|
@ -50,7 +50,7 @@ You can query Microsoft Defender ATP data by using [Advanced hunting](advanced-h
|
|||||||
|
|
||||||
Here is an example query:
|
Here is an example query:
|
||||||
|
|
||||||
```PowerShell
|
```kusto
|
||||||
DeviceEvents
|
DeviceEvents
|
||||||
| where ActionType startswith 'Asr'
|
| where ActionType startswith 'Asr'
|
||||||
```
|
```
|
||||||
|
@ -40,7 +40,7 @@ There are various ways to ensure more complex queries return these columns. For
|
|||||||
|
|
||||||
The sample query below counts the number of unique machines (`DeviceId`) with antivirus detections and uses this count to find only the machines with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function.
|
The sample query below counts the number of unique machines (`DeviceId`) with antivirus detections and uses this count to find only the machines with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function.
|
||||||
|
|
||||||
```
|
```kusto
|
||||||
DeviceEvents
|
DeviceEvents
|
||||||
| where Timestamp > ago(7d)
|
| where Timestamp > ago(7d)
|
||||||
| where ActionType == "AntivirusDetection"
|
| where ActionType == "AntivirusDetection"
|
||||||
|
@ -53,7 +53,7 @@ You can query Microsoft Defender ATP data by using [Advanced hunting](https://do
|
|||||||
|
|
||||||
Here is an example query:
|
Here is an example query:
|
||||||
|
|
||||||
```PowerShell
|
```kusto
|
||||||
DeviceEvents
|
DeviceEvents
|
||||||
| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
|
| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
|
||||||
```
|
```
|
||||||
|
@ -56,7 +56,7 @@ You can query Microsoft Defender ATP data by using [Advanced hunting](https://do
|
|||||||
|
|
||||||
Here is an example query
|
Here is an example query
|
||||||
|
|
||||||
```PowerShell
|
```kusto
|
||||||
DeviceEvents
|
DeviceEvents
|
||||||
| where ActionType in ('ExploitGuardNetworkProtectionAudited','ExploitGuardNetworkProtectionBlocked')
|
| where ActionType in ('ExploitGuardNetworkProtectionAudited','ExploitGuardNetworkProtectionBlocked')
|
||||||
```
|
```
|
||||||
|
@ -167,7 +167,7 @@ When an exception is created for a recommendation, the recommendation is no long
|
|||||||
|
|
||||||
3. Enter the following queries:
|
3. Enter the following queries:
|
||||||
|
|
||||||
```
|
```kusto
|
||||||
// Search for machines with High active alerts or Critical CVE public exploit
|
// Search for machines with High active alerts or Critical CVE public exploit
|
||||||
DeviceTvmSoftwareInventoryVulnerabilities
|
DeviceTvmSoftwareInventoryVulnerabilities
|
||||||
| join kind=inner(DeviceTvmSoftwareVulnerabilitiesKB) on CveId
|
| join kind=inner(DeviceTvmSoftwareVulnerabilitiesKB) on CveId
|
||||||
|
Loading…
x
Reference in New Issue
Block a user