Query Details
// ATP Detection for Critical Identities // https://www.linkedin.com/posts/activity-7190937404625584128-hgdO/ // Custom DefenderXDR detection for CloudApp Advanced Threat Protection for Tier 0 Critical Identities giving you a comprehensive all-round threat monitoring. let HighlyPrivilegedAdmins = ExposureGraphNodes | where set_has_element(Categories, "identity") | where isnotnull(NodeProperties.rawData.criticalityLevel) and NodeProperties.rawData.criticalityLevel.criticalityLevel==0 | extend EntraObjectID = NodeProperties.rawData.accountObjectId | project EntraObjectID; CloudAppEvents | where ActionType == "AtpDetection" | extend DetectionMethod = tostring(RawEventData.DetectionMethod) | extend AccountUpn = RawEventData.UserId | where AccountUpn has_any(HighlyPrivilegedAdmins)
This KQL query is designed to detect threats targeting highly privileged administrative accounts (Tier 0 Critical Identities) using CloudApp Advanced Threat Protection (ATP). Here's a simplified breakdown:
Identify Highly Privileged Admins:
ExposureGraphNodes to find identities (accounts).EntraObjectID for these critical accounts.Monitor CloudApp Events:
CloudAppEvents for actions labeled as "AtpDetection".AccountUpn).In summary, this query is used to monitor and detect potential threats specifically targeting highly privileged administrative accounts using CloudApp ATP.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators