Detections

KQL hunting queries and detection rules for Microsoft Sentinel, Defender XDR, and Defender for Cloud — synced from GitHub. 6 rules

Synced from github.com/pthoor/detections-ai-kql

IT Helpdesk Imposters in External DMs

Surface social-engineering lures in Teams external direct messages that impersonate IT helpdesk or support staff. Detects display names and recipient details containing helpdesk, IT support, or work-from-home themed keywords commonly used in phishing attacks.

Initial Access T1534
MessageEvents Defender for Office 365 Scheduled

Malicious Verdicts in Teams

Find Teams messages that have already received Spam, Phish, or Malware verdicts from Microsoft Defender for Office 365. Provides a fast triage queue of confirmed malicious content delivered via Teams.

Initial Access T1566
MessageEvents Defender for Office 365 Scheduled

Rare External Domains with Clicks in Teams

Surfaces rare external domains seen in Teams messages and correlates them with user click activity from UrlClickEvents. Designed for incident response to quickly identify when users have interacted with uncommon or potentially malicious links delivered via external Teams conversations.

Initial Access T1566 T1566.002
MessageEvents MessageUrlInfo UrlClickEvents Defender for Office 365 Scheduled