Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit d69c608

Browse files
committed
added links to other bluekeep queries
1 parent 269b7e0 commit d69c608

File tree

4 files changed

+24
-0
lines changed

4 files changed

+24
-0
lines changed

Command and Control/c2-bluekeep.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,12 @@ This query can be used to detect the following attack techniques and tactics ([s
4242
| Misconfiguration | | |
4343
| Malware, component | | |
4444

45+
## See also
46+
47+
* [Detect BlueKeep-related mining](../Execution/detect-bluekeep-related-mining.md)
48+
* [Detect BlueKeep exploitation attempts](../Initial%20access/detect-bluekeep-exploitation-attempts.md)
49+
* [Detect suspicious RDP activity related to BlueKeep](..\Lateral%20Movement\detect-suspicious-rdp-connections.md)
50+
4551
## Contributor info
4652

4753
**Contributor:** Microsoft Threat Protection team

Execution/detect-bluekeep-related-mining.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,12 @@ This query can be used to detect the following attack techniques and tactics ([s
4141
| Misconfiguration | | |
4242
| Malware, component | | |
4343

44+
## See also
45+
46+
* [Detect BlueKeep exploitation attempts](../Initial%20access/detect-bluekeep-exploitation-attempts.md)
47+
* [Detect suspicious RDP activity related to BlueKeep](..\Lateral%20Movement\detect-suspicious-rdp-connections.md)
48+
* [Detect command-and-control communication related to BlueKeep cryptomining](../Command%20and%20Control/c2-bluekeep.md)
49+
4450
## Contributor info
4551

4652
**Contributor:** Microsoft Threat Protection team

Initial access/detect-bluekeep-exploitation-attempts.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,12 @@ This query can be used to detect the following attack techniques and tactics ([s
3838
| Misconfiguration | | |
3939
| Malware, component | | |
4040

41+
## See also
42+
43+
* [Detect BlueKeep-related mining](../Execution/detect-bluekeep-related-mining.md)
44+
* [Detect command-and-control communication related to BlueKeep cryptomining](../Command%20and%20Control/c2-bluekeep.md)
45+
* [Detect suspicious RDP activity related to BlueKeep](..\Lateral%20Movement\detect-suspicious-rdp-connections.md)
46+
4147
## Contributor info
4248

4349
**Contributor:** Microsoft Threat Protection team

Lateral Movement/detect-suspicious-rdp-connections.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,12 @@ This query can be used to detect the following attack techniques and tactics ([s
5252
| Misconfiguration | | |
5353
| Malware, component | | |
5454

55+
## See also
56+
57+
* [Detect BlueKeep-related mining](../Execution/detect-bluekeep-related-mining.md)
58+
* [Detect command-and-control communication related to BlueKeep cryptomining](../Command%20and%20Control/c2-bluekeep.md)
59+
* [Detect BlueKeep exploitation attempts](../Initial%20access/detect-bluekeep-exploitation-attempts.md)
60+
5561
## Contributor info
5662

5763
**Contributor:** Microsoft Threat Protection team

0 commit comments

Comments
 (0)