Query Details
//Threat Hunting Nation State Actors //https://www.linkedin.com/feed/update/urn:li:activity:7173156446581219328/ //In view of recent security updates from Microsoft on the January breach by Midnight Blizzard, for those on Microsoft Entra ID P2 you can also use Signin log's riskEventsTypes_v2 to threat hunt for possible nation state actors involvement on your Entra tenant by using below KQL query. SigninLogs | where TimeGenerated > ago(90d) | extend V2Risk = tostring(RiskEventTypes_V2) | where V2Risk contains "estsRiskStateP"
This query is designed to help identify potential nation-state actors involved in security breaches within a Microsoft Entra ID P2 environment. Here's a simple breakdown:
SigninLogs, which records sign-in activities.V2Risk, which converts the RiskEventTypes_V2 field to a string.V2Risk field contains the string "estsRiskStateP".In summary, this query helps you find recent sign-in attempts that have specific risk indicators, which could suggest involvement by sophisticated threat actors, such as nation-state hackers.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators