Query Details
## Rule: Detection of untrusted processe running for USB by ASR ### Description This query detects events where an untrusted USB process has been audited by the Advanced Security Audit Policy (ASR). - [Microsoft documentation on ASR](https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings) ### Detection Logic Monitors `DeviceEvents` for occurrences where the `ActionType` is `"AsrUntrustedUsbProcessAudited"`. ### Tags - ASR - USB - Auditing ### Search Query ```kql DeviceEvents | where ActionType == "AsrUntrustedUsbProcessAudited" ```
This query is designed to detect instances where an untrusted process related to a USB device has been flagged by the Advanced Security Audit Policy (ASR). It specifically looks for events in the DeviceEvents table where the ActionType is "AsrUntrustedUsbProcessAudited". This helps in identifying potentially malicious activities involving USB devices.
DeviceEvents table.ActionType must be "AsrUntrustedUsbProcessAudited".DeviceEvents
| where ActionType == "AsrUntrustedUsbProcessAudited"

Ali Hussein
Released: July 15, 2024
Tables
Keywords
Operators