Skip to main content
0 votes
0 answers
30 views

I am searching for EventID 4738 logs in the SecurityEvents table in sentinel. This log has several fields which contain either the new value if it was changed, or "-" if it wasn't changed. I ...
JamesB202's user avatar
0 votes
1 answer
174 views

I'm working with Microsoft Sentinel and need to create monitoring queries to track the health status of data connectors. Specifically, I want to: Identify unhealthy or disconnected data connectors ...
Benjamin Hirst's user avatar
-4 votes
1 answer
460 views

I have set up the AMA firewall data connector in Azure and the associated DCR. I've installed the agent on a test endpoint. I've read the guidance on "Set Up the Azure Monitor Agent on Windows ...
Ollie's user avatar
  • 17.6k
0 votes
0 answers
54 views

For one of our client we have onboarded 500+ custom detection rules in Microsoft Defender, as they were migrating from another EDR solution to Defender. Now client ask is, they have created a new ...
Manisha's user avatar
0 votes
1 answer
112 views

I am trying to trigger the following KQL query in a custom scheduled Analytics Rule... It is to identify ANY Global Administrator and verify if they have committed any activity (Sign-in) over the last ...
Jason Smyth's user avatar
0 votes
0 answers
158 views

I am trying to create a user defined function to store as a global function. This has to accept two field parameters and spit out a table. I managed to get it to work as an inline function. let ...
codechallengedSINCE95's user avatar
-1 votes
1 answer
290 views

I'm working on setting Microsoft Sentinel connect to my VM for my personal projects using Terraform. I have successfully configured my Log Analytics Workspace, Sentinel, and VM Extension. However, ...
Samuel Lee's user avatar
0 votes
1 answer
290 views

I am trying to import Microsoft Entra ID logs from Tenant1 and Tenant2 into a Azure Log Analytics Workspace that is deployed in my main tenant. To achieve this, I attempted to use Azure Event Hub on ...
Marija's user avatar
  • 1
-2 votes
1 answer
123 views

I am using the EmailUrlInfo table in XDR Advanced hunting, when you click on a URL you get more information, including a "Threat intelligence verdict" which tells you if Defender deems the ...
Katie's user avatar
  • 9
0 votes
0 answers
73 views

Issue Summary I'm are trying to manually trigger a Microsoft Sentinel Scheduled Analytics Rule using the triggerRuleRun API, but it always fails with the following error: { "errors": { &...
imaprog's user avatar
0 votes
1 answer
444 views

I have tried implementing Auxiliary logs, but unable to ingest logs to auxiliary table, how it works? I have tried log ingestion via text and json file but unable to receive logs to log analytic ...
Manisha's user avatar
0 votes
1 answer
61 views

I would like to make a rule that will check if a user is a privileged account or not. To do this, there's a watchlist with account name templates (e.g. adm.;aadz-;kaadmin;t0_). The final aim is to ...
ecrv's user avatar
  • 1
0 votes
1 answer
154 views

I would like to integrate my Azure Purview with Azure Sentinel. I have followed the steps described in the official documentation at this "https://learn.microsoft.com/en-us/purview/register-scan-...
Ragil Suryo Nugroho's user avatar
0 votes
1 answer
168 views

I am attempting to deploy an ARM Template (execution using PowerShell) for any Analytic Rule to a Microsoft Sentinel instance. I have been following this link: https://learn.microsoft.com/en-us/azure/...
Jason Smyth's user avatar
0 votes
0 answers
186 views

We recently received found a risky signin for a user (e.g. IP address was pointing at some location different from actual location) and following investigation it was discovered the user had clicked ...
Cataster's user avatar
  • 3,601

15 30 50 per page
1
2 3 4 5
17