Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 6148746

Browse files
authored
Merge pull request #188 from AntoineJo/patch-2
New queries based on customer requests
2 parents c440bcd + 2789c5d commit 6148746

File tree

2 files changed

+16
-0
lines changed

2 files changed

+16
-0
lines changed
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
//Check all created files
2+
// that does not have extension ps1, bat or cmd to avoid IT Pro scripts
3+
// that are not copied to C:\ to detect all file share, external drive, data partition that are not allowed, etc.
4+
// this could help to detect malicious insider/user that has unencrypted data partition and that are using it to exfiltrate data even while removable devices & cloud storage is blocked
5+
DeviceFileEvents
6+
| where ActionType == "FileCreated"
7+
| extend extension= extract(@".*(\..*)$",1,FileName)
8+
| where extension !in (".ps1",".bat",".cmd")
9+
| extend DriveLetterOrShare=split(FolderPath,':')[0]
10+
| where DriveLetterOrShare != 'C'
11+
| project tostring(DriveLetterOrShare), FolderPath, FileName, DeviceId, DeviceName, ReportId, Timestamp, ShareName, IsAzureInfoProtectionApplied, SensitivityLabel, SensitivitySubLabel, InitiatingProcessFileName, InitiatingProcessAccountUpn, InitiatingProcessCommandLine
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
//This query looks for local admin account used to logon into the computer
2+
//this can help to detect malicious insiders that were able to add a local account to the local admin group offline
3+
DeviceLogonEvents
4+
| where IsLocalAdmin == 1
5+
and AccountDomain == DeviceName

0 commit comments

Comments
 (0)