Query Details
DeviceNetworkEvents
| where RemoteIPType == "Public"
| where InitiatingProcessVersionInfoProductName !in ("Sophos Anti-Virus","Google Chrome","Microsoft Edge","Firefox")
| where RemoteUrl has_any ((externaldata(domain: string, ioc: string) [@"https://raw.githubusercontent.com/drb-ra/C2IntelFeeds/master/feeds/domainC2s-30day.csv"]
with (format=csv, ignoreFirstRecord=true) | where ioc contains_cs "C2 Domain" | distinct domain))
This KQL (Kusto Query Language) query is designed to filter network events on devices based on specific criteria. Here's a simplified summary:
In essence, the query identifies potentially suspicious network events involving public IPs, excluding common trusted software, and cross-references these events with known malicious domains.

Ali Hussein
Released: September 13, 2023
Tables
Keywords
Operators