Skip to content

Commit 76f5cf4

Browse files
authored
Update Suspicious-Logon-Detection-DC's.kql
1 parent 2ea581a commit 76f5cf4

File tree

1 file changed

+1
-6
lines changed

1 file changed

+1
-6
lines changed

AAD-IR/Suspicious-Logon-Detection-DC's.kql

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,6 @@
22
// the event data, including the object that was changed, its class, and the type of operation that was performed (whether a value was added or deleted). It then parses
33
// the object name to extract the group and organizational unit (OU) names.
44
// The query then joins the extracted object class to a predefined ADObjectTypes table to assign a user-friendly name to the class. The query also determines whether the
5-
// group name matches any of the groups in a predefined list of critical AD groups, as well as any critical containers. It then assigns a severity level based on whether
6-
// the group or container change is critical.
7-
// The results of the query include the time the event was generated, the object class, the severity level, the account that made the change, the object that was
8-
// changed, the operation type, the group name, whether the group change was critical, whether the container change was critical, the user-friendly name for the object
9-
// class, and the name of the organizational unit.
105

116
let ADObjectTypes = datatable (ObjectClass:string, Severity:string, UIText:string)
127
["domainDNS","High","root domain","user", "Low","User", "group",
@@ -31,4 +26,4 @@ SecurityEvent
3126
| extend Severity = iif(CriticalGroupChange == "true","High",Severity)
3227
| extend Severity = iif(CriticalContainerChange == "true","High",Severity)
3328
| project TimeGenerated, ObjectClass, Severity, Account, OperationType, GroupName, CriticalGroupChange, CriticalContainerChange
34-
| order by TimeGenerated desc
29+
| order by TimeGenerated desc

0 commit comments

Comments
 (0)