Query Details
//This query detects high severity security alerts from MCAS related to failed logins SecurityAlert | where ProviderName == "MCAS" | where AlertSeverity == "High" | extend Href_ = tostring(parse_json(ExtendedLinks)[1].Href) | extend AccountCustomEntity = CompromisedEntity | extend URLCustomEntity = Href_ | extend FileHashCustomEntity = Description
This query is designed to identify high severity security alerts from Microsoft Cloud App Security (MCAS) that are associated with failed login attempts. Here's a breakdown of what the query does:
Data Source: It starts by looking at the SecurityAlert data set.
Filter by Provider: It filters the alerts to only include those generated by "MCAS" (Microsoft Cloud App Security).
Filter by Severity: It further narrows down the results to only include alerts with a "High" severity level.
Extract URL: It extracts a URL from the ExtendedLinks field and assigns it to a new field called Href_.
Map Entities:
CompromisedEntity field to a new field called AccountCustomEntity.Href_) to a new field called URLCustomEntity.Description field to a new field called FileHashCustomEntity.In summary, this query identifies high severity alerts from MCAS related to failed logins and extracts specific details such as a URL and compromised account information for further analysis or investigation.

User Submission
Released: November 10, 2024
Tables
Keywords
Operators