Skip to content

Commit d498337

Browse files
committed
New images
1 parent ba87fc5 commit d498337

File tree

3 files changed

+2
-2
lines changed

3 files changed

+2
-2
lines changed

defender-xdr/advanced-hunting-best-practices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -193,8 +193,6 @@ The [summarize operator](/azure/data-explorer/kusto/query/summarizeoperator) agg
193193
| summarize hint.shufflekey = RecipientEmailAddress count() by Subject, RecipientEmailAddress
194194
```
195195
196-
197-
198196
## Query scenarios
199197
200198
### Identify unique processes with process IDs
@@ -234,6 +232,8 @@ DeviceProcessEvents
234232

235233
The query summarizes by both `InitiatingProcessId` and `InitiatingProcessCreationTime` so that it looks at a single process, without mixing multiple processes with the same process ID.
236234

235+
:::image type="content" source="/defender/media/best-practice-unique-processid.png" alt-text="Screenshot of sample query results for getting unique processes in the Microsoft Defender portal." lightbox="/defender/media/best-practice-unique-processid-tb.png":::
236+
237237
### Query command lines
238238
There are numerous ways to construct a command line to accomplish a task. For example, an attacker could reference an image file without a path, without a file extension, using environment variables, or with quotes. The attacker could also change the order of parameters or add multiple quotes and spaces.
239239

128 KB
Loading
89.3 KB
Loading

0 commit comments

Comments
 (0)