Query Details
// Multi-Cloud DefenderXDR KQL Threat Detection
// https://www.linkedin.com/posts/activity-7198893996356640769-cow0/
// A composite detection using MDCA threat intelligence to hunt for activities in various cloud environments and resources covered by MDC. 🤯
let MaliciousIPs =
CloudAppEvents
| where Timestamp > ago(30d)
| where IPTags has_any ("Brute force attacker", "Password spray attacker", "Malicious", "Tor", "Botnet", "Darknet scanning IP", "Malware C&C server") or IPCategory == "Risky"
| distinct IPAddress;
CloudAuditEvents
| where Timestamp > ago(30d)
| where IPAddress has_any(MaliciousIPs)
This KQL query is designed to detect potential threats in various cloud environments using threat intelligence from Microsoft Defender for Cloud Apps (MDCA). Here's a simplified breakdown:
Identify Malicious IPs:
Check Cloud Audit Events:
In essence, this query helps to identify and cross-reference malicious activities across different cloud environments by leveraging threat intelligence data to spot potentially harmful IP addresses and their associated activities.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators