Forum Widgets
Latest Discussions
kql query for distinct values
Hi there, I'm trying to query all computers that match 2 or more DISTINCT DisplayName fields. I can get the distinct count: SecurityAlert | where ProductName in("Microsoft Defender Advanced Threat Protection") | where ProviderName == "MDATP" | mv-expand parsejson(Entities) |extend Computer = tostring(Entities.HostName) |summarize dcount(DisplayName) by Computer |where dcount_DisplayName >= 2 |where Computer <> "" But I want a table that lists out the Computer AND all of the unique DisplayNames for each Computer. eg: Host1 - DisplayName1 DisplayName2 Host2 - DisplayName1 DisplayName2 In Splunk this would simply be: | stats values(DisplayName) as DisplayName, dc(DisplayName) by host Thanks for your thoughts.SolvedSocInABoxMar 20, 2021Iron Contributor75KViews0likes8CommentsWhat exactly is the AppDisplayName "Microsoft Authentication Broker"
Hello, When reviewing failed Sign In attempts through KQL (invalid username/password), I sometimes see the AppDisplayName to be "Microsoft Authentication Broker". I have tried looking for the answer online, and it does seem to be related to some kind of authentication broker service (makes sense for the name). But I have yet to figure out what exactly it is. I guessed that this was perhaps the authentication app for Microsoft, but I did some testing on my own device and was unable to trigger the logs for Microsoft Authentication Broker. Has someone else any experience dealing with these? Might it be something going on in the background of MS?SolvedTobias_MoeSep 15, 2023Copper Contributor63KViews0likes5CommentsKQL String Search With Wildcards?
Is it possible to do KQL string searches with wildcards? For example, I'm hunting for files written to C:\ProgramData\ but I don't want to see files written to subfolders. I've done this in Splunk so I was surprised that the last line in my query below does not filter out anything. Show this: C:\ProgramData\evil.exe Filter this out: C:\ProgramData\MyApp\NotEvil.exe Query: DeviceFileEvents | where ActionType == "FileCreated" | where FolderPath contains "ProgramData" | where FolderPath !contains "ProgramData\\*\\*"SolvedTheDillyMar 17, 2022Copper Contributor53KViews0likes2CommentsMicrosoft Teams Flow Bot
Anyone able to use Azure Sentinel --> Logic App with MS Teams Flow Bot to post message in a channel ? I haven't figure how to do it and although my logic app Post a message to Teams works - when my action is Post a message as the Flow Bot in a channel always failsakefallonitisApr 28, 2020Brass Contributor50KViews0likes8CommentsComment/Uncomment multiple lines
Hi all, Do you know a way to comment and uncomment multiple lines in the Logs Blade in Azure Sentinel ? I find it not convenient to type "//" every time. Is there a way to create a custom shortcut for it ? Kind regards, Emmanuel NGUYENemmanuelnguyenApr 29, 2020Copper Contributor37KViews0likes8CommentsLoop through array in KQL
Hi, I've been exploring parsing and noticed that when parsing xml you get dictionaries and arrays. You can't pass those in functions, but you can pass a var of type dynamic, but then to loop you have to make a table and join the table with the query that you ran. Does anybody have any idea of how to loop through an array, I couldn't find anything around this?LodewykVOct 23, 2020Copper Contributor35KViews0likes5CommentsKQL query question: Filter out results where condition1, condition2, condition3 all evaluate true
Hi Sentinel friends, I've googled and read through many guides and can't find an easy way to perform a multi-variable exclusion statement. I need to be able to exclude a result if multiple variables ALL evaluate true. The pseudo logic I'm looking to apply is something like: Table | where Event == "12" (pseudo code) | except where (condition1 == x AND condition2 == y AND condition 3 == z) I tried things like: 1) | !where condition1 == "x" and condition2 == "y" and condition3 == "z" [this doesn't work] 2) | where !(condition1 == "x" and condition2 == "y" and condition3 == "z") [this doesn't work] 3) | where condition1 != "x" and !condition2 != "y" and condition3 == "z" [the logic here evaluates all conditions separately, instead I need it to only exclude only when all of the variables evaluate true for a specific log line] The only way I could figure out how to do this was to do 2 queries then do a left antijoin of the resulting datasets, but it's a big and messy query. I'm hoping that there's a simpler method that I'm missing. Ex: Table | where Event == "12" | join kind=leftanti ( Table |where Event == "12" | where condition1 == "x" and condition2 == "y" and condition3 == "z") on KEY Note: I did find materialize so at least I'm not querying the dataset twice.browesecJul 20, 2020Copper Contributor31KViews0likes5CommentsAzure Sentinel vs. Azure LogAnalytics
Hi, Do we have already available some kind of comparison chart between Azure Sentinel and Azure LogAnalytics. I'm trying to understand differences between these two solutions. What to pick for customer cases. Thanks Br, JoonasJoonas PakkanenApr 16, 2019Brass Contributor30KViews1like5CommentsHow to get all logs for a specific user in sentinel
Hi Community, Help me out how to get all the logs for an user in sentinel. I was using the below quire but it is not written the expected results UserAccessAnalytics | where SourceEntityName == user email address. Thanks, Kishorekishore_socAug 25, 2021Copper Contributor29KViews0likes3Comments
Resources
Tags
- siem404 Topics
- KQL279 Topics
- data collection225 Topics
- Log Data200 Topics
- analytics143 Topics
- azure137 Topics
- automation126 Topics
- integration122 Topics
- kusto113 Topics
- playbooks110 Topics