Query Details

Linux Desktop Public Egress Baseline Low Noise

Query

## Linux Desktop – Public Egress Baseline (Low Noise)

### Query name

**`Linux Desktop – Public egress baseline (low noise) – last 24h`**

### Purpose

Provides a **low-noise view of outbound public network traffic** on Linux desktop or workstation devices (for example, Ubuntu desktops, developer VMs, user laptops).

This baseline aggressively excludes:

* Operating system background services
* Package management traffic
* Defender agent traffic

The goal is to surface **user-initiated or tool-driven network activity** quickly, without drowning in expected OS behaviour.

### Query

```kql
let LinuxDeviceIds =
    DeviceInfo
    | where OSPlatform == "Linux"
    | distinct DeviceId;
DeviceNetworkEvents
| where Timestamp > ago(24h)
| where DeviceId in (LinuxDeviceIds)
| where RemoteIPType == "Public"
| where RemoteIP !startswith "127."
| where InitiatingProcessFileName !in (
    "sensecm",
    "snapd",
    "networkmanager",
    "fwupdmgr"
)
| where InitiatingProcessFolderPath !startswith "/usr/lib/apt/"
| where InitiatingProcessCommandLine !contains "ubuntu-release-upgrader"
| project
    Timestamp,
    DeviceName,
    InitiatingProcessFileName,
    InitiatingProcessCommandLine,
    RemoteIP,
    RemotePort,
    Protocol
| order by Timestamp desc
```

### Why these exclusions are appropriate on desktops

* **sensecm** – Defender for Endpoint agent (always safe to exclude)
* **snapd** – Canonical Snap infrastructure (very chatty on desktops)
* **networkmanager** – Connectivity checks, VPN, Wi‑Fi management
* **fwupdmgr** – Firmware metadata refresh
* **APT methods** – Package installation and updates
* **ubuntu-release-upgrader** – OS upgrade checks

On desktops, these processes are expected and rarely represent attacker tradecraft.

### Typical activity you will still see

* `curl`, `wget`, `python`, `node`
* Developer tools reaching external APIs
* Manual uploads/downloads
* Red team / EDR test traffic

### When to use this query

* Validating Linux EDR on workstations
* Hunting user-driven behaviour
* Reducing noise during investigations

Explanation

This query is designed to monitor and analyze outbound public network traffic from Linux desktop or workstation devices, such as Ubuntu desktops, developer virtual machines, and user laptops, over the past 24 hours. The focus is on identifying user-initiated or tool-driven network activities while filtering out routine operating system activities that could clutter the data.

Key Points:

  1. Target Devices: The query specifically looks at devices running Linux.

  2. Time Frame: It examines network events from the last 24 hours.

  3. Public Traffic: It filters for network events where the remote IP is public, excluding local IPs like "127.x.x.x".

  4. Exclusions:

    • It excludes traffic from common background services and system processes such as:
      • Defender for Endpoint agent (sensecm)
      • Snap infrastructure (snapd)
      • Network management (networkmanager)
      • Firmware updates (fwupdmgr)
      • Package management (APT methods)
      • OS upgrade checks (ubuntu-release-upgrader)
  5. Output: The query provides details like the timestamp, device name, process initiating the connection, command line used, remote IP and port, and protocol.

  6. Use Cases:

    • Validating Endpoint Detection and Response (EDR) solutions on Linux workstations.
    • Investigating user-driven network activities.
    • Reducing noise in network traffic data to focus on potentially significant activities.

By excluding expected system processes, this query helps in quickly identifying unusual or user-driven network activities, which could be relevant for security investigations or monitoring developer activities.

Details

Nathan Hutchinson profile picture

Nathan Hutchinson

Released: February 2, 2026

Tables

DeviceInfoDeviceNetworkEvents

Keywords

LinuxDevicesNetworkTrafficUserWorkstations

Operators

let|where==distinctin!startswith!in!containsprojectorder bydescago

Actions