Query Details
# SignIn From Suspicious IP
## Query Information
#### Description
This query combines threat intelligence feeds with Entra ID sign-in information.
## Defender XDR
```KQL
let IPs = ThreatIntelligenceIndicator
| where isnotempty( NetworkSourceIP)
| where ConfidenceScore > 70
| distinct NetworkSourceIP;
AADSignInEventsBeta
| where IPAddress in (IPs)
| project TimeGenerated, AccountUpn, IPAddress, Country
```
## Sentinel
```KQL
let IPs = ThreatIntelligenceIndicator
| where isnotempty( NetworkSourceIP)
| where ConfidenceScore > 70
| distinct NetworkSourceIP;
SigninLogs
| where IPAddress in (IPs)
| project TimeGenerated, UserPrincipalName, IPAddress, Location
```This query is designed to identify sign-ins from potentially suspicious IP addresses by combining threat intelligence data with sign-in logs from Entra ID (formerly Azure Active Directory). Here's a simple breakdown of what each part does:
Threat Intelligence Data:
Sign-In Logs:
AADSignInEventsBeta table to find and display the relevant sign-in events.SigninLogs table to find and display the relevant sign-in events.In summary, this query helps in identifying and investigating sign-ins from IP addresses that are considered suspicious based on threat intelligence data.

Bert-Jan Pals
Released: September 25, 2024
Tables
Keywords
Operators