Add Microsoft Defender machine logon users to a Microsoft Sentinel incident comment
-
Updated
May 24, 2023
Add Microsoft Defender machine logon users to a Microsoft Sentinel incident comment
Simple KQL query that can be run either in MD for Endpoint (Threat hunting or Custom indicator) or in Azure Sentinel (Threat hunting or analytics rule).It's looking for 4 known IOCs related to the Kaseya attack
Add a description, image, and links to the microsoft-defender-for-endopoint topic page so that developers can more easily learn about it.
To associate your repository with the microsoft-defender-for-endopoint topic, visit your repo's landing page and select "manage topics."