Query Details
Tags:
Query:
DeviceNetworkEvents
| where RemoteUrl has_any ("letsencrypt.org", "sslforfree.com", "zerossl.com", "freessl.org")
| where InitiatingProcessFolderPath !startswith @"c:\program files" | where InitiatingProcessParentFileName != @"SenseIR.exe" and InitiatingProcessVersionInfoProductName != @"Windows ACME Simple (WACS)"
References:
This KQL (Kusto Query Language) query is designed to filter network events on devices to identify potentially suspicious activity related to certain SSL certificate providers. Here's a simple summary:
DeviceNetworkEvents, which contains information about network activities on devices.RemoteUrl (the URL the device is connecting to) contains any of the following domains: letsencrypt.org, sslforfree.com, zerossl.com, or freessl.org.c:\program files directory.SenseIR.exe.Windows ACME Simple (WACS).In essence, this query is looking for network connections to specific SSL certificate-related domains, but it filters out connections initiated by known legitimate processes and locations to focus on potentially suspicious activities.

Ali Hussein
Released: September 14, 2023
Tables
Keywords
Operators