Query Details
// KQL Sniper for Compromised Account (Sentinel UEBA) // https://www.linkedin.com/posts/activity-7199442661735374850-GqAK/ // The KQL script provided demonstrates a high level of precision in detecting a breached account by employing Sentinel UEBA analytics, given that every criterion within the conditions is satisfied. 🎯 BehaviorAnalytics | where TimeGenerated > ago(90d) | where DevicesInsights contains "ThreatIntelIndicatorType" | extend ThreatIntel=tostring(DevicesInsights.ThreatIntelIndicatorDescription) | where ThreatIntel contains "IP Address used for validating compromised Entra ID credentials" | where SourceDevice == "" and ActivityType != "FailedLogOn" | where InvestigationPriority > 0 | project TimeGenerated, InvestigationPriority, UserPrincipalName, SourceIPAddress, SourceIPLocation, UsersInsights, DevicesInsights, ActivityInsights
This KQL query is designed to detect compromised accounts using Sentinel User and Entity Behavior Analytics (UEBA). Here's a simplified summary:
BehaviorAnalytics table.TimeGenerated, InvestigationPriority, UserPrincipalName, SourceIPAddress, SourceIPLocation, UsersInsights, DevicesInsights, and ActivityInsights.In essence, this query identifies high-priority incidents involving compromised accounts based on specific threat intelligence and activity patterns.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators