You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AAD-IR/Suspicious-Logon-Detection-DC's.kql
+1-6Lines changed: 1 addition & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,6 @@
2
2
// the event data, including the object that was changed, its class, and the type of operation that was performed (whether a value was added or deleted). It then parses
3
3
// the object name to extract the group and organizational unit (OU) names.
4
4
// The query then joins the extracted object class to a predefined ADObjectTypes table to assign a user-friendly name to the class. The query also determines whether the
5
-
// group name matches any of the groups in a predefined list of critical AD groups, as well as any critical containers. It then assigns a severity level based on whether
6
-
// the group or container change is critical.
7
-
// The results of the query include the time the event was generated, the object class, the severity level, the account that made the change, the object that was
8
-
// changed, the operation type, the group name, whether the group change was critical, whether the container change was critical, the user-friendly name for the object
9
-
// class, and the name of the organizational unit.
0 commit comments