Windows Defender

LP_Microsoft Defender XDR - High Severity Alert
Description This alert is triggered when a high severity alert is created in Microsoft Defender. Severe alerts are often associated with Advanced Persistent Threats(APT). These alerts indicate a high risk due to the potential damage they can cause to devices.
Log source Microsoft Graph
Value Examples include activities related to credential theft, ransomware activities, tampering with security sensors, or other malicious activities indicative of a human adversary.
Rationale This alert highlights high-risk activities detected by Microsoft Defender, often indicative of APT behavior. Examples such as credential theft (T1003), ransomware activity (T1486), and security control tampering (T1562) align with known adversarial techniques. Early detection of such behavior is critical for preventing lateral movement, data exfiltration, or business disruption. This supports NIST 800-53 controls such as SI-4 (System Monitoring) and IR-5 (Incident Monitoring), ISO/IEC 27001 Annex A.12.4 (Logging and Monitoring), and CIS Control 8 (Audit Log Management).
Query
Copy
norm_id=MicrosoftGraph api_endpoint="security/alerts_v2" 
risk_level=high | process json_parser(evidence, ".[].deviceDnsName | 
[-1]") as host | process json_parser(evidence, ".[].osPlatform|[0] ") 
as os | process json_parser(evidence,".[].userAccount.userPrincipalName")
as user_principal_name | process eval("upn=mvjoin(user_principal_name,',')") | 
process json_parser (evidence, ".[].fileDetails |.[0].fileDetails.sha1 ") as hash_sha1 | 
process json_parser (evidence, ".[].fileDetails.fileName") as fileName | 
process eval("file=mvjoin(fileName,', ')") 
Comments  
Type Alert
MITRE ATT&CK T1003 – OS Credential Dumping, T1486 – Data Encrypted for Impact, T1562 – Impair Defenses

 

LP_Microsoft Defender XDR - Host Generating Multiple Alerts
Description This alarm is triggered when a single host generates multiple alarms within a short period of time.
Log source Microsoft Graph
Value A high volume of alerts from a single host in a short period may signal an active compromise involving techniques such as use of valid credentials (T1078), execution of malicious scripts or binaries (T1059), or remote service exploitation (T1021) for lateral movement. Such behavior is consistent with post-exploitation phases of a targeted attack. Monitoring this activity supports early detection and incident response efforts aligned with NIST 800-53 (SI-4, IR-4), ISO/IEC 27001 (A.12.6.1 – Event Logging), and CIS Controls 3 (Data Protection) and 8 (Audit Log Management).
Rationale A high volume of alerts from a single host in a short period may signal an active compromise involving techniques such as use of valid credentials (T1078), execution of malicious scripts or binaries (T1059), or remote service exploitation (T1021) for lateral movement. Such behavior is consistent with post-exploitation phases of a targeted attack. Monitoring this activity supports early detection and incident response efforts aligned with NIST 800-53 (SI-4, IR-4), ISO/IEC 27001 (A.12.6.1 – Event Logging), and CIS Controls 3 (Data Protection) and 8 (Audit Log Management).
Query
Copy
norm_id="MicrosoftGraph" api_endpoint="security/alerts_v2" | 
process json_parser(evidence, ".[].deviceDnsName | [-1]") as host | 
filter host=* | chart distinct_count(detection_id) as cnt by host | 
filter cnt > 5 
Comments Legitimate actions such as security tests or system updates can trigger false positives.
Type Alert
MITRE ATT&CK T1078 – Valid Accounts, T1059 – Command and Scripting Interpreter, T1021 – Remote Services

 

LP_Microsoft Defender XDR - Multiple Alerts Involving Same User
Description This alert is triggered when multiple alerts are generated regarding the same user within a short period of time in the Microsoft Defender XDR portal. This may indicate suspicious behavior, such as a compromised account, insider threat, or malware infection exploiting user credentials.
Log source Microsoft Graph
Value Security teams should immediately investigate these alerts to validate the cause and take appropriate action. It can be part of a coordinated attack involving privilege escalation, unauthorized access, or data exfiltration.
Rationale A cluster of alerts involving the same user in a short period suggests possible account compromise, credential abuse, or insider threat activity. Adversaries may exploit valid credentials (T1078), execute malicious scripts (T1086), or alter authentication mechanisms (T1556) to maintain persistence and escalate privileges. Detecting this early supports containment and response efforts crucial to minimizing impact. It aligns with NIST 800-53 controls AC-7 (Unsuccessful Logon Attempts), IR-4 (Incident Handling), ISO/IEC 27001 A.12.6.1 (Event Logging), and CIS Controls 5 (Account Management) and 16 (Incident Response Management).
Query
Copy
norm_id="MicrosoftGraph" api_endpoint="security/alerts_v2" | 
process json_parser(evidence,".[].userAccount.displayName | 
[0]") as user | process json_parser(evidence,".[].userAccount.azureAdUserId |
[0]") as user_id | filter user=* | chart distinct_count(detection_id) as cnt by user_id, user | 
filter cnt > 5
Comments -
Type Alert
MITRE ATT&CK T1078 – Valid Accounts, T1086 – PowerShell, T1556 – Modify Authentication Process

 

LP_Microsoft EntraID - User at Risk
Description Triggers when a user is marked as 'atRisk' or 'confirmedCompromised' in the Microsoft EntraID (Azure AD) portal. It indicates that the user's account may be compromised or that the user poses an insider threat risk. This can include events like 'impossibleTravel', 'anomalousUserActivity', 'anonymizedIPAddress', 'maliciousIPAddress'.
Log source Microsoft Graph
Value Microsoft Entra Identity Protection is a tool that helps organizations identify, analyze and manage identity-related risks within their Microsoft Entra environment. Addressing this quickly can prevent potential data breaches, unauthorized access and other security incidents. However, legitimate actions or human error can trigger false positives.
Rationale This alert identifies users flagged as 'atRisk' or 'confirmedCompromised' based on identity protection signals like impossible travel or use of anonymized IP addresses. These indicators are strongly associated with account takeover (T1078), unauthorized cloud access (T1530), or brute-force attempts (T1110). Timely response is essential to prevent escalation or exfiltration activities. This aligns with NIST 800-53 AC-2 (Account Management), SI-4 (System Monitoring), and IR-4 (Incident Handling), ISO/IEC 27001 A.12.6.1 (Event Logging), and CIS Controls 5 (Account Management), 6 (Access Control Management), and 16 (Incident Response).
Query
Copy
norm_id="MicrosoftGraph" api_endpoint="identityProtection/riskDetections" status IN 
["atRisk", "confirmedCompromised"]
Comments -
Type Alert
MITRE ATT&CK T1078 – Valid Accounts, T1530 – Data from Cloud Storage Object, T1110 – Brute Force

 

LP_Potentially Unwanted Software Detected
Description This alert is triggered when potentially unwanted software is detected in the system. Potentially unwanted software may include programs that are harmful or pose a risk to the system. They can sometimes be bundled with legitimate software as an extra package. Threat actors can exploit these programs to perform malicious activities.
Log source Microsoft Graph
Value Receive alerts when users in your organization have received bundled software.
Rationale Potentially unwanted software (PUS) may serve as a vector for further compromise. Though not always malicious on its own, PUS can facilitate user execution of harmful payloads (T1204) or be exploited for persistence via system-level triggers (T1546). Early detection helps prevent adversaries from escalating privilege or establishing footholds. Monitoring for such software supports NIST 800-53 SI-3 (Malicious Code Protection) and CM-7 (Least Functionality), ISO/IEC 27001 A.12.2.1 (Controls against malware), and aligns with CIS Controls 2 (Inventory of Software) and 8 (Audit Log Management).
Query
Copy
norm_id IN ["MicrosoftDefenderATP", "MicrosoftGraph"] attack_category="UnwantedSoftware" 
Comments -
Type Alert
MITRE ATT&CK T1204 – User Execution, T1546 – Event Triggered Execution

 

ENTRA ID IDENTITY PROTECTION
Description This dashboard provides insight to Entra ID Entity Protection events.
Log source Microsoft Graph
Value Provides insight to the risk level from Defender for Entra ID.
Widgets / Use cases

1. Detected Risks

2. Risk Level over Time

3. Risk Overview

4. Risk by Level

5. Risk by State

6. Risk by Activity

7. Risk by Detection Timing Type

8. Risk by Event Type

9. Risk by Geolocation

10. Top 10 Risky Users

11. Risky Users Overview

12. User Sign-in Risk Detail

Comments -
Type Dashboard