Query Details
// Part 2: DefenderXDR KQL detection for fake CrowdStrike domain URL // https://www.linkedin.com/posts/activity-7220748665924042752-pRST/ // Hourly custom detection: Detect & Purge EmailUrlInfo | where Timestamp > ago(1h) | join EmailEvents on NetworkMessageId | where EmailDirection == "Inbound" | where LatestDeliveryAction == "Delivered" | where UrlDomain contains "crowdstrike" | where UrlDomain !endswith "crowdstrike.com" | where SenderFromDomain !endswith "crowdstrike.com" and SenderFromDomain !endswith "litmos.com" and SenderFromDomain !endswith "zoom.us"
This KQL query is designed to detect and remove emails that contain URLs mimicking the CrowdStrike domain, which could be indicative of phishing attempts. Here's a simplified breakdown:
NetworkMessageId).crowdstrike.com, litmos.com, zoom.us).In essence, this query identifies potentially malicious emails that appear to be from CrowdStrike but are not from their legitimate domain, and then purges them.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators