Query Details
// Critical Monitor for Critical Assets // https://www.linkedin.com/posts/activity-7189844353610088448-BajA/ Custom DefenderXDR KQL Monitor for Tier 0 Critical Identities on High Security Alerts: let HighlyPrivilegedAdmins = ExposureGraphNodes | where set_has_element(Categories, "identity") | where isnotnull(NodeProperties.rawData.criticalityLevel) and NodeProperties.rawData.criticalityLevel.criticalityLevel==0 | extend EntraObjectID = NodeProperties.rawData.accountObjectId | project EntraObjectID; AlertInfo | join AlertEvidence on AlertId | extend ReportId = AlertId | where Severity == "High" | where AccountObjectId has_any(HighlyPrivilegedAdmins)
This KQL query is designed to monitor high-security alerts for critical identities, specifically Tier 0 critical identities, within a custom Defender XDR setup. Here’s a simplified breakdown:
Identify Critical Identities:
ExposureGraphNodes table.EntraObjectID for these critical identities.Filter High Severity Alerts:
AlertInfo table and joins it with the AlertEvidence table using the AlertId.ReportId which is the same as AlertId.Match Alerts to Critical Identities:
HighlyPrivilegedAdmins).In summary, this query identifies high-severity security alerts that are related to the most critical admin accounts in the system.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators