Query Details
//Detect invalid certificates //Data connector required for this query - M365 Defender - Device* tables DeviceEvents | where ActionType == "AntivirusReport" | extend ParsedAdditionalFields = parse_json(AdditionalFields) | evaluate bag_unpack(ParsedAdditionalFields) | where Signer startswith "INVALID"
This query is used to detect invalid certificates. It requires a data connector called M365 Defender - Device* tables. It filters the DeviceEvents table for entries with ActionType "AntivirusReport". It then parses the AdditionalFields column as JSON and unpacks the resulting bag. Finally, it filters for entries where the Signer starts with "INVALID".

Matt Zorich
Released: October 10, 2023
Tables
Keywords
Operators