Query Details
//This query identifies security events containing IP addresses in the watch list "FocusIP"
//Useful for quick alerts against specific IPs from CISO requests or ephemeral IP-based threat intel
SecurityAlert
| project IPs = tostring(parse_json(ExtendedProperties)["IP Addresses"])
| extend IPs = split(IPs,",") | mv-expand IPs
| where isnotempty(IPs) | distinct tostring(IPs) // get only unique IPs
| union (SecurityAlert // join to Entities IP pool
| mv-expand parse_json(Entities)
| project IPs = Entities["Address"]
| where isnotempty(IPs) | distinct tostring(IPs)) // get only unique IPs
| order by IPs
// Lookup events using a Watchlist -- join data for any event that is also
| lookup kind=inner _GetWatchlist('FocusIP')
on $left.IPs == $right.SearchKey This query is designed to identify security events that involve IP addresses listed in a specific watchlist called "FocusIP." Here's a simplified breakdown of what the query does:
Extract IP Addresses from Security Alerts:
Combine with Entities IP Pool:
Order the IP Addresses:
Match with Watchlist:
This query is useful for quickly identifying and alerting on specific IP addresses that are of interest, such as those flagged by a Chief Information Security Officer (CISO) or identified as potential threats.

@TanukiSec
Released: November 10, 2024
Tables
Keywords
Operators