Query Details
// Defending Cyber Threats Leveraging Microsoft Graph API // https://www.linkedin.com/posts/activity-7201866283464679424-Jf-5/ // Using Sentinel User and Entity Behavior Analytics (UEBA) threat intelligence data to triangulate attacker launching Graph API attacks on your Entra tenant. Prerequisites: Sentinel UEBA and MicrosoftGraphActivityLogs enabled. let AttackerIP = BehaviorAnalytics | where TimeGenerated > ago(90d) | where DevicesInsights contains "ThreatIntelIndicatorType" and SourceDevice == "" | extend ThreatIntel=tostring(DevicesInsights.ThreatIntelIndicatorDescription) | where InvestigationPriority > 0 and ThreatIntel contains "hashtag#AttackerIP" | distinct SourceIPAddress; MicrosoftGraphActivityLogs | where TimeGenerated > ago(90d) | where IPAddress has_any (AttackerIP)
This query is designed to identify and analyze potential attackers targeting your Microsoft Entra tenant using the Microsoft Graph API. It leverages threat intelligence data from Sentinel's User and Entity Behavior Analytics (UEBA) and Microsoft Graph Activity Logs. Here's a simplified breakdown:
Identify Attacker IPs:
Analyze Graph API Activity:
In summary, this query helps you detect and investigate malicious activities by correlating attacker IP addresses from threat intelligence data with Microsoft Graph API activity logs.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators