Skip to content

Commit 3148bff

Browse files
committed
Bump MDXDR to 3.0.14; add Punycode hunting query
1 parent 2bb1e50 commit 3148bff

File tree

5 files changed

+496
-385
lines changed

5 files changed

+496
-385
lines changed

Solutions/Microsoft Defender XDR/Data/Solution_Microsoft Defender XDR.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -375,15 +375,16 @@
375375
"Hunting Queries/Ransomware/QakbotDiscoveryActivities.yaml",
376376
"Hunting Queries/Ransomware/ShadowCopyDeletion.yaml",
377377
"Hunting Queries/Ransomware/TurningOffServicesWithSCCommad.yaml",
378-
"Hunting Queries/TVM/Detect_CISA_Alert_AA22-117A2021_Top_Routinely_Exploited_Vulnerabilities.yaml"
378+
"Hunting Queries/TVM/Detect_CISA_Alert_AA22-117A2021_Top_Routinely_Exploited_Vulnerabilities.yaml",
379+
"Hunting Queries/Email and Collaboration Queries/Phish/Punycode chars lookalike domains.yaml"
379380
],
380381
"Workbooks" : [
381382
"Workbooks/MicrosoftDefenderForOffice365detectionsandinsights.json",
382383
"Workbooks/MicrosoftDefenderForEndPoint.json",
383384
"Workbooks/MicrosoftDefenderForIdentity.json"
384385
],
385386
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Microsoft Defender XDR",
386-
"Version": "3.0.13",
387+
"Version": "3.0.14",
387388
"Metadata": "SolutionMetadata.json",
388389
"TemplateSpec": true,
389390
"StaticDataConnectorIds": [
241 KB
Binary file not shown.

Solutions/Microsoft Defender XDR/Package/createUiDefinition.json

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"config": {
77
"isWizard": false,
88
"basics": {
9-
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Microsoft%20Defender%20XDR/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Microsoft Defender XDR](https://www.microsoft.com/security/business/threat-protection/microsoft-365-defender) solution for Microsoft Sentinel enables you to ingest Security Alerts/Incidents and raw logs from the products within Microsoft Defender XDR suite into Microsoft Sentinel.\n\nAdditional Hunting Queries to support proactive and reactive hunting for the Microsoft Defender XDR solution can be found on [GitHub](https://github.com/Azure/Azure-Sentinel/tree/master/Hunting%20Queries/Microsoft%20365%20Defender). This repository has a collection of queries developed by Microsoft Security Research and Microsoft Sentinel community contributions.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Azure Monitor HTTP Data Collector API](https://docs.microsoft.com/azure/azure-monitor/logs/data-collector-api)\n\n**Data Connectors:** 1, **Workbooks:** 3, **Analytic Rules:** 40, **Hunting Queries:** 326\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
9+
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Microsoft%20Defender%20XDR/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Microsoft Defender XDR](https://www.microsoft.com/security/business/threat-protection/microsoft-365-defender) solution for Microsoft Sentinel enables you to ingest Security Alerts/Incidents and raw logs from the products within Microsoft Defender XDR suite into Microsoft Sentinel.\n\nAdditional Hunting Queries to support proactive and reactive hunting for the Microsoft Defender XDR solution can be found on [GitHub](https://github.com/Azure/Azure-Sentinel/tree/master/Hunting%20Queries/Microsoft%20365%20Defender). This repository has a collection of queries developed by Microsoft Security Research and Microsoft Sentinel community contributions.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Azure Monitor HTTP Data Collector API](https://docs.microsoft.com/azure/azure-monitor/logs/data-collector-api)\n\n**Data Connectors:** 1, **Workbooks:** 3, **Analytic Rules:** 40, **Hunting Queries:** 327\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
1010
"subscription": {
1111
"resourceProviders": [
1212
"Microsoft.OperationsManagement/solutions",
@@ -194,7 +194,7 @@
194194
"name": "analytic2-text",
195195
"type": "Microsoft.Common.TextBlock",
196196
"options": {
197-
"text": "This query uses Microsoft Defender for Endpoint data to look for IoCs associated with the SUNSPOT malware shared by Crowdstrike.\nMore details: \n - https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/'\n - https://techcommunity.microsoft.com/blog/microsoftsentinelblog/monitoring-the-software-supply-chain-with-azure-sentinel/2176463"
197+
"text": "This query uses Microsoft Defender for Endpoint data to look for IoCs associated with the SUNSPOT malware shared by Crowdstrike.\nMore details: \n - https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/\n - https://techcommunity.microsoft.com/blog/microsoftsentinelblog/monitoring-the-software-supply-chain-with-azure-sentinel/2176463/"
198198
}
199199
}
200200
]
@@ -5318,6 +5318,20 @@
53185318
}
53195319
}
53205320
]
5321+
},
5322+
{
5323+
"name": "huntingquery327",
5324+
"type": "Microsoft.Common.Section",
5325+
"label": "Punycode lookalikes",
5326+
"elements": [
5327+
{
5328+
"name": "huntingquery327-text",
5329+
"type": "Microsoft.Common.TextBlock",
5330+
"options": {
5331+
"text": "Punycode lookalike domains in Emails and Teams messages This hunting query depends on MicrosoftThreatProtection data connector (EmailEvents EmailUrlInfo MessageUrlInfo MessageEvents Parser or Table)"
5332+
}
5333+
}
5334+
]
53215335
}
53225336
]
53235337
}

0 commit comments

Comments
 (0)