User Activity Tracking with KQL
Microsoft Sentinel & Defender XDR - SOC Analyst Playbook
π― Overview
π Data Sources Quick Reference
Available Tables
Table Name
Source
Description
Retention
Event ID to Table Mapping
Windows Event ID
Sentinel Table
Defender XDR Table
π Phase 1: Initial Triage Queries
1.1 Quick Account Profile (Sentinel)
1.2 Quick Account Profile (Defender XDR)
1.3 Is This Account Under Attack? (Quick Check)
π Phase 2: Authentication Analysis
2.1 Complete Authentication Timeline (Sentinel)
2.2 Failed Logon Analysis - Brute Force Detection
2.3 Successful Logon After Failed Attempts (Successful Breach)
2.4 Logon Type Analysis (Sentinel)
πΊοΈ Phase 3: Lateral Movement Detection
3.1 Network Logon Chain Analysis (Defender XDR)
3.2 Lateral Movement with Process Correlation
3.3 Administrative Reconnaissance Detection
3.4 Pass-the-Hash Detection (Sentinel)
π¨ Phase 4: Privilege Escalation & Admin Activity
4.1 Detect New Admin Rights Assignments
4.2 Explicit Credential Usage (RunAs)
4.3 Service Account Interactive Logon Detection
π Phase 5: Azure AD / Cloud Authentication Analysis
5.1 Comprehensive Azure AD Sign-in Analysis
5.2 Impossible Travel Detection
5.3 Anomalous Application Access
5.4 Conditional Access Policy Failures
π― Phase 6: Behavioral Analytics (UEBA)
6.1 User Risk Score Analysis
6.2 Peer Group Comparison
π§ Phase 7: Advanced Hunting Techniques
7.1 Multi-Stage Attack Detection
7.2 Account Reconnaissance and Exploitation
7.3 Data Exfiltration via Compromised Account
π Phase 8: Workbooks and Dashboards
8.1 Account Usage Overview Dashboard (KQL for Workbook)
8.2 Real-Time Monitoring Query
π Phase 9: Automated Response Queries
9.1 Automated Threat Hunting - Scheduled Query
9.2 Incident Creation Query (For Automation Rules)
π Pro Tips and Best Practices
Query Optimization
Time Range Best Practices
Null Handling
Summarization Tips
π Alert Rules (Analytic Rules)
High-Priority Alert: Admin Account Brute Force Success
Alert: Impossible Travel Detected
π Investigation Playbook Cheatsheet
Quick Investigation Steps
π Integration with SOAR
Logic App/Playbook Trigger Query
PreviousEnhanced Windows Event Log Investigation GuideNextProgram Execution Artifacts Investigation Guide
Last updated