Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Microsoft-365-Defender-Hunting-Queries Alternatives
Similar projects and alternatives to Microsoft-365-Defender-Hunting-Queries
-
Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
security-onion
Discontinued Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
-
h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
fly-catcher
✈️ A device that detects for aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Built using a Raspberry Pi 3B and a FlightAware SDR
Microsoft-365-Defender-Hunting-Queries reviews and mentions
-
Smartscreen reports
There are few smart screen reports under “Protection Events” folder. All this is already in the Security Center portal but you can find some better description here https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries
- Defender Advance Hunting
- Must have analytic rules
- New user question - Hunting cookbook?
- Advance Threat Hunting 101
-
How to monitor for ransomware attacks?
This github repo has a variety of hunting rules: https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries
-
The Kusto Query Language
I always find myself going back to my colleague Michael's Tracking the Adversary 4 part webcast where it takes you from 100 to 400 level in the context of threat hunting: https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Webcasts/TrackingTheAdversary
- Joining FileEvents to Process events
-
Detecting/blocking malicious IPs
I use a KQL query from https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries. Look in the Discovery section and try the DetectTorRelayConnectivity query. I've then created a custom detection rule to pick up instances of the alert.
- Advanced Hunting Query for SAM DB Access
-
A note from our sponsor - InfluxDB
www.influxdata.com | 23 Apr 2024
Stats
microsoft/Microsoft-365-Defender-Hunting-Queries is an open source project licensed under MIT License which is an OSI approved license.
The primary programming language of Microsoft-365-Defender-Hunting-Queries is Jupyter Notebook.
Popular Comparisons
- Microsoft-365-Defender-Hunting-Queries VS security-onion
- Microsoft-365-Defender-Hunting-Queries VS Azure-Sentinel
- Microsoft-365-Defender-Hunting-Queries VS h4cker
- Microsoft-365-Defender-Hunting-Queries VS HELK
- Microsoft-365-Defender-Hunting-Queries VS Hunting-Queries-Detection-Rules
- Microsoft-365-Defender-Hunting-Queries VS hid-examples
- Microsoft-365-Defender-Hunting-Queries VS Sentinel-Queries
- Microsoft-365-Defender-Hunting-Queries VS fly-catcher
Sponsored