Jan 03 2023 02:06 PM - edited Jan 03 2023 02:07 PM
Use matching analytics to detect threats
https://learn.microsoft.com/en-us/azure/sentinel/use-matching-analytics-to-detect-threats
Hello All,
So I came across the documentation above but do not have the prerequisites of CEF, DNS or syslog. We have Data for MS Cloud, Office365 and Microsoft Defender for Endpoint in Sentinel . I have also setup Threat Intelligence Taxii feeds in Sentinel. Is there really no other way to use the TI to match against common fields like doman/url/ip/hashes from MDE?
I am new to KQL but I was trying something similar with the query below but I feel my query is off. Please let me know what is missing or if this simiply can't be done.
In other SIEMs like Splunk you can easily take IOCs in an index and search across other index's for matches. I was hoping their would be a similar way to accomplish this task in MS Sentinel.
Thanks
let dt_lookBack = 1h;
let ioc_lookBack = 14d;
ThreatIntelligenceIndicator
| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()
| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId
| where Active == true
// Picking up only IOC's that contain the entities we want
| where isnotempty(Url)
| extend RemoteUrl = Url
// using innerunique to keep perf fast and result set low, we only need one match to indicate potential malicious activity that needs to be investigated
| join kind=innerunique (
DeviceNetworkEvents
| where TimeGenerated >= ago(dt_lookBack)
| where isnotempty(RemoteUrl)
) on RemoteUrl
| where TimeGenerated < ExpirationDateTime
| summarize TimeGenerated = arg_max(TimeGenerated, *) by IndicatorId, Url
| project-reorder