mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 20:33:42 +00:00
viz queries
This commit is contained in:
@ -24,20 +24,17 @@ ms.topic: article
|
|||||||
|
|
||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
|
||||||
|
|
||||||
|
[!INCLUDE [Prerelease information](../includes/prerelease.md)]
|
||||||
|
|
||||||
While you can construct your [advanced hunting](advanced-hunting-overview.md) queries to return very precise information, you can also work with the query results to gain further insight and investigate specific activities and indicators. You can take the following actions on your query results:
|
While you can construct your [advanced hunting](advanced-hunting-overview.md) queries to return very precise information, you can also work with the query results to gain further insight and investigate specific activities and indicators. You can take the following actions on your query results:
|
||||||
|
|
||||||
- View results as a table or charts
|
- View results as a table or chart
|
||||||
- Export tables and charts
|
- Export tables and charts
|
||||||
- Drill down to detailed entity information
|
- Drill down to detailed entity information
|
||||||
- Tweak your queries directly from the results or apply filters
|
- Tweak your queries directly from the results or apply filters
|
||||||
|
|
||||||
## View query results as tables or charts
|
## View query results as a table or chart
|
||||||
By default, advanced hunting displays query results as tabular data. You can also display the same data as a chart.
|
By default, advanced hunting displays query results as tabular data. You can also display the same data as a chart. Advanced hunting supports the following views:
|
||||||
|
|
||||||

|
|
||||||
*Query results for alerts by platform and severity displayed as a stacked chart*
|
|
||||||
|
|
||||||
To render charts, advanced hunting automatically identifies columns of interest and numeric values to aggregate. Advanced hunting supports the following views:
|
|
||||||
|
|
||||||
| View type | Description |
|
| View type | Description |
|
||||||
| -- | -- |
|
| -- | -- |
|
||||||
@ -50,11 +47,63 @@ To render charts, advanced hunting automatically identifies columns of interest
|
|||||||
| **Scatter chart** | Plots numeric values for a series of unique items |
|
| **Scatter chart** | Plots numeric values for a series of unique items |
|
||||||
| **Area chart** | Plots numeric values for a series of unique items and fills the sections below the plotted values |
|
| **Area chart** | Plots numeric values for a series of unique items and fills the sections below the plotted values |
|
||||||
|
|
||||||

|
### Construct queries for effective charts
|
||||||
*Line chart showing the number of events involving a specific file over time*
|
When rendering charts, advanced hunting automatically identifies columns of interest and the numeric values to aggregate. To get meaningful charts, construct your queries to return the specific values you want to see visualized. Here are some sample queries and the resulting charts.
|
||||||
|
|
||||||
|
#### Alerts by severity
|
||||||
|
Use the `summarize` operator to obtain a numeric count of the values you want to chart. The query below uses the `summarize` operator to get the number of alerts by severity.
|
||||||
|
|
||||||
|
```kusto
|
||||||
|
DeviceAlertEvents
|
||||||
|
| summarize Total = count() by Severity
|
||||||
|
```
|
||||||
|
When rendering the results, a column chart displays each severity value as a separate column:
|
||||||
|
|
||||||
|

|
||||||
|
*Query results for alerts by severity displayed as a column chart*
|
||||||
|
|
||||||
|
#### Alert severity by operating system
|
||||||
|
You could also use the `summarize` operator to prepare results for charting values from multiple fields. For example, you might want to understand how alert severities are distributed across operating systems (OS).
|
||||||
|
|
||||||
|
The query below uses a `join` operator to pull in OS information from the `DeviceInfo` table, and then uses `summarize` to count values in both the `OSPlatform` and `Severity` columns:
|
||||||
|
|
||||||
|
```kusto
|
||||||
|
DeviceAlertEvents
|
||||||
|
| join DeviceInfo on DeviceId
|
||||||
|
| summarize Count = count() by OSPlatform, Severity
|
||||||
|
```
|
||||||
|
These results are best visualized using a stacked column chart:
|
||||||
|
|
||||||
|

|
||||||
|
*Query results for alerts by OS and severity displayed as a stacked chart*
|
||||||
|
|
||||||
|
#### Top ten machine groups with alerts
|
||||||
|
If you're dealing with a list of values that isn’t finite, you can use the `Top` operator to chart only the values with the most instances. For example, to get the top ten machine groups with the most alerts, use the query below:
|
||||||
|
|
||||||
|
```kusto
|
||||||
|
DeviceAlertEvents
|
||||||
|
| join DeviceInfo on DeviceId
|
||||||
|
| summarize Count = count() by MachineGroup
|
||||||
|
| top 10 by Count
|
||||||
|
```
|
||||||
|
Use the pie chart view to effectively show distribution across the top domains:
|
||||||
|
|
||||||

|

|
||||||
*Pie chart showing distribution of phishing emails by sender domain*
|
*Pie chart showing distribution of alerts across machine groups*
|
||||||
|
|
||||||
|
#### Malware detections over time
|
||||||
|
Using the `summarize` operator with the `bin()` function, you can check for events involving a particular indicator over time. The query below counts detections of an EICAR test file at 30 minute intervals to show spikes in activity related to that file:
|
||||||
|
|
||||||
|
```kusto
|
||||||
|
DeviceEvents
|
||||||
|
| where ActionType == "AntivirusDetection"
|
||||||
|
| where SHA1 == "3395856ce81f2b7382dee72602f798b642f14140"
|
||||||
|
| summarize Detections = count() by bin(Timestamp, 30m)
|
||||||
|
```
|
||||||
|
The line chart below clearly highlights time periods with more detections of the test malware:
|
||||||
|
|
||||||
|

|
||||||
|
*Line chart showing the number of detections of a test malware over time*
|
||||||
|
|
||||||
|
|
||||||
## Export tables and charts
|
## Export tables and charts
|
||||||
@ -64,7 +113,7 @@ After running a query, select **Export** to save the results to local file. Your
|
|||||||
- **Any chart** — the query results are exported as a JPEG image of the rendered chart
|
- **Any chart** — the query results are exported as a JPEG image of the rendered chart
|
||||||
|
|
||||||
## Drill down from query results
|
## Drill down from query results
|
||||||
To view more information about entities, such as machines, files, users, IP addresses, and URLs, in your query results, simply click the entity identifier. This opens a detailed profile page for the selected entity in Microsoft Defender Security Center.
|
To view more information about entities, such as machines, files, users, IP addresses, and URLs, in your query results, simply click the entity identifier. This opens a detailed profile page for the selected entity.
|
||||||
|
|
||||||
## Tweak your queries from the results
|
## Tweak your queries from the results
|
||||||
Right-click a value in the result set to quickly enhance your query. You can use the options to:
|
Right-click a value in the result set to quickly enhance your query. You can use the options to:
|
||||||
@ -73,14 +122,14 @@ Right-click a value in the result set to quickly enhance your query. You can use
|
|||||||
- Exclude the selected value from the query (`!=`)
|
- Exclude the selected value from the query (`!=`)
|
||||||
- Get more advanced operators for adding the value to your query, such as `contains`, `starts with` and `ends with`
|
- Get more advanced operators for adding the value to your query, such as `contains`, `starts with` and `ends with`
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Filter the query results
|
## Filter the query results
|
||||||
The filters displayed to the right provide a summary of the result set. Each column has its own section that lists the distinct values found for that column and the number of instances.
|
The filters displayed to the right provide a summary of the result set. Each column has its own section that lists the distinct values found for that column and the number of instances.
|
||||||
|
|
||||||
Refine your query by selecting the `+` or `-` buttons on the values that you want to include or exclude and then selecting **Run query**.
|
Refine your query by selecting the `+` or `-` buttons on the values that you want to include or exclude and then selecting **Run query**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Once you apply the filter to modify the query and then run the query, the results are updated accordingly.
|
Once you apply the filter to modify the query and then run the query, the results are updated accordingly.
|
||||||
|
|
||||||
@ -89,6 +138,6 @@ Once you apply the filter to modify the query and then run the query, the result
|
|||||||
- [Learn the query language](advanced-hunting-query-language.md)
|
- [Learn the query language](advanced-hunting-query-language.md)
|
||||||
- [Use shared queries](advanced-hunting-shared-queries.md)
|
- [Use shared queries](advanced-hunting-shared-queries.md)
|
||||||
- [Hunt for threats across devices and emails](advanced-hunting-query-emails-devices.md)
|
- [Hunt for threats across devices and emails](advanced-hunting-query-emails-devices.md)
|
||||||
- [Understand the schema](advanced-hunting-schema-tables.md)
|
- [Understand the schema](advanced-hunting-schema-reference.md)
|
||||||
- [Apply query best practices](advanced-hunting-best-practices.md)
|
- [Apply query best practices](advanced-hunting-best-practices.md)
|
||||||
- [Custom detections overview](custom-detections-overview.md)
|
- [Custom detections overview](overview-custom-detections.md)
|
Binary file not shown.
After Width: | Height: | Size: 94 KiB |
Reference in New Issue
Block a user