Query Details
## Linux Desktop – Public Egress Baseline (Low Noise)
### Query name
**`Linux Desktop – Public egress baseline (low noise) – last 24h`**
### Purpose
Provides a **low-noise view of outbound public network traffic** on Linux desktop or workstation devices (for example, Ubuntu desktops, developer VMs, user laptops).
This baseline aggressively excludes:
* Operating system background services
* Package management traffic
* Defender agent traffic
The goal is to surface **user-initiated or tool-driven network activity** quickly, without drowning in expected OS behaviour.
### Query
```kql
let LinuxDeviceIds =
DeviceInfo
| where OSPlatform == "Linux"
| distinct DeviceId;
DeviceNetworkEvents
| where Timestamp > ago(24h)
| where DeviceId in (LinuxDeviceIds)
| where RemoteIPType == "Public"
| where RemoteIP !startswith "127."
| where InitiatingProcessFileName !in (
"sensecm",
"snapd",
"networkmanager",
"fwupdmgr"
)
| where InitiatingProcessFolderPath !startswith "/usr/lib/apt/"
| where InitiatingProcessCommandLine !contains "ubuntu-release-upgrader"
| project
Timestamp,
DeviceName,
InitiatingProcessFileName,
InitiatingProcessCommandLine,
RemoteIP,
RemotePort,
Protocol
| order by Timestamp desc
```
### Why these exclusions are appropriate on desktops
* **sensecm** – Defender for Endpoint agent (always safe to exclude)
* **snapd** – Canonical Snap infrastructure (very chatty on desktops)
* **networkmanager** – Connectivity checks, VPN, Wi‑Fi management
* **fwupdmgr** – Firmware metadata refresh
* **APT methods** – Package installation and updates
* **ubuntu-release-upgrader** – OS upgrade checks
On desktops, these processes are expected and rarely represent attacker tradecraft.
### Typical activity you will still see
* `curl`, `wget`, `python`, `node`
* Developer tools reaching external APIs
* Manual uploads/downloads
* Red team / EDR test traffic
### When to use this query
* Validating Linux EDR on workstations
* Hunting user-driven behaviour
* Reducing noise during investigationsThis query is designed to monitor and analyze outbound public network traffic from Linux desktop or workstation devices, such as Ubuntu desktops, developer virtual machines, and user laptops, over the past 24 hours. The focus is on identifying user-initiated or tool-driven network activities while filtering out routine operating system activities that could clutter the data.
Target Devices: The query specifically looks at devices running Linux.
Time Frame: It examines network events from the last 24 hours.
Public Traffic: It filters for network events where the remote IP is public, excluding local IPs like "127.x.x.x".
Exclusions:
sensecm)snapd)networkmanager)fwupdmgr)ubuntu-release-upgrader)Output: The query provides details like the timestamp, device name, process initiating the connection, command line used, remote IP and port, and protocol.
Use Cases:
By excluding expected system processes, this query helps in quickly identifying unusual or user-driven network activities, which could be relevant for security investigations or monitoring developer activities.

Nathan Hutchinson
Released: February 2, 2026
Tables
Keywords
Operators