<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>thoor.tech — Detection Rules</title>
  <subtitle>KQL hunting queries and detection rules for Microsoft Sentinel, Defender XDR, and Defender for Cloud</subtitle>
  <link href="https://thoor.tech/detections/feed.xml" rel="self" type="application/atom+xml"/>
  <link href="https://thoor.tech/detections/" rel="alternate" type="text/html"/>
  <id>https://thoor.tech/detections/</id>
  <updated>2026-03-31T16:03:09+02:00</updated>
  <author>
    <name>Pierre Thoor</name>
  </author>
  
  
  <entry>
    <title>External DMs with Links in Teams</title>
    <link href="https://thoor.tech/detections/#det-external-dms-with-links-teams" rel="alternate" type="text/html"/>
    <id>https://thoor.tech/detections/#det-external-dms-with-links-teams</id>
    <updated>2026-03-31T16:03:09+02:00</updated>
    <summary>Identify top external domains sending links in Teams direct messages over the last 7 days. Filters out common trusted Microsoft domains to reduce noise and highlights the most prolific external link sources for investigation.</summary>
    <category term="Defender for Office 365" label="Product: Defender for Office 365"/>
    
    <category term="Initial Access" label="Tactic: Initial Access"/>
    
    
    <category term="T1566" label="MITRE: T1566"/>
    
    <category term="T1566.002" label="MITRE: T1566.002"/>
    
    
    <category term="MessageEvents" label="Data Source: MessageEvents"/>
    
    <category term="MessageUrlInfo" label="Data Source: MessageUrlInfo"/>
    
    
    <category term="Teams" label="Teams"/>
    
    <category term="MDO" label="MDO"/>
    
    <category term="External Threats" label="External Threats"/>
    
    <category term="Phishing" label="Phishing"/>
    
  </entry>
  
  <entry>
    <title>IT Helpdesk Imposters in External DMs</title>
    <link href="https://thoor.tech/detections/#det-helpdesk-imposters-external-dms" rel="alternate" type="text/html"/>
    <id>https://thoor.tech/detections/#det-helpdesk-imposters-external-dms</id>
    <updated>2026-03-31T16:03:09+02:00</updated>
    <summary>Surface social-engineering lures in Teams external direct messages that impersonate IT helpdesk or support staff. Detects display names and recipient details containing helpdesk, IT support, or work-from-home themed keywords commonly used in phishing attacks.</summary>
    <category term="Defender for Office 365" label="Product: Defender for Office 365"/>
    
    <category term="Initial Access" label="Tactic: Initial Access"/>
    
    
    <category term="T1534" label="MITRE: T1534"/>
    
    
    <category term="MessageEvents" label="Data Source: MessageEvents"/>
    
    
    <category term="Teams" label="Teams"/>
    
    <category term="MDO" label="MDO"/>
    
    <category term="Social Engineering" label="Social Engineering"/>
    
    <category term="Helpdesk Impersonation" label="Helpdesk Impersonation"/>
    
  </entry>
  
  <entry>
    <title>Malicious Verdicts in Teams</title>
    <link href="https://thoor.tech/detections/#det-malicious-verdicts-teams" rel="alternate" type="text/html"/>
    <id>https://thoor.tech/detections/#det-malicious-verdicts-teams</id>
    <updated>2026-03-31T16:03:09+02:00</updated>
    <summary>Find Teams messages that have already received Spam, Phish, or Malware verdicts from Microsoft Defender for Office 365. Provides a fast triage queue of confirmed malicious content delivered via Teams.</summary>
    <category term="Defender for Office 365" label="Product: Defender for Office 365"/>
    
    <category term="Initial Access" label="Tactic: Initial Access"/>
    
    
    <category term="T1566" label="MITRE: T1566"/>
    
    
    <category term="MessageEvents" label="Data Source: MessageEvents"/>
    
    
    <category term="Teams" label="Teams"/>
    
    <category term="MDO" label="MDO"/>
    
    <category term="Malware" label="Malware"/>
    
    <category term="Phishing" label="Phishing"/>
    
    <category term="Spam" label="Spam"/>
    
  </entry>
  
  <entry>
    <title>Rare External Domains with Clicks in Teams</title>
    <link href="https://thoor.tech/detections/#det-rare-external-domains-with-clicks-teams" rel="alternate" type="text/html"/>
    <id>https://thoor.tech/detections/#det-rare-external-domains-with-clicks-teams</id>
    <updated>2026-03-31T16:03:09+02:00</updated>
    <summary>Surfaces rare external domains seen in Teams messages and correlates them with user click activity from UrlClickEvents. Designed for incident response to quickly identify when users have interacted with uncommon or potentially malicious links delivered via external Teams conversations.</summary>
    <category term="Defender for Office 365" label="Product: Defender for Office 365"/>
    
    <category term="Initial Access" label="Tactic: Initial Access"/>
    
    
    <category term="T1566" label="MITRE: T1566"/>
    
    <category term="T1566.002" label="MITRE: T1566.002"/>
    
    
    <category term="MessageEvents" label="Data Source: MessageEvents"/>
    
    <category term="MessageUrlInfo" label="Data Source: MessageUrlInfo"/>
    
    <category term="UrlClickEvents" label="Data Source: UrlClickEvents"/>
    
    
    <category term="Teams" label="Teams"/>
    
    <category term="MDO" label="MDO"/>
    
    <category term="External Threats" label="External Threats"/>
    
    <category term="Rare Domains" label="Rare Domains"/>
    
    <category term="Click Tracking" label="Click Tracking"/>
    
  </entry>
  
  <entry>
    <title>Safe Links Click Events Telemetry for Teams</title>
    <link href="https://thoor.tech/detections/#det-safe-links-click-events-teams" rel="alternate" type="text/html"/>
    <id>https://thoor.tech/detections/#det-safe-links-click-events-teams</id>
    <updated>2026-03-31T16:03:09+02:00</updated>
    <summary>Confirm Safe Links outcomes and adoption in Teams by summarizing click events from the last 24 hours. Groups clicks by action type to show how many clicks were allowed, blocked, or pending verdict, and how many unique users were involved.</summary>
    <category term="Defender for Office 365" label="Product: Defender for Office 365"/>
    
    <category term="Initial Access" label="Tactic: Initial Access"/>
    
    
    <category term="T1566" label="MITRE: T1566"/>
    
    
    <category term="UrlClickEvents" label="Data Source: UrlClickEvents"/>
    
    
    <category term="Teams" label="Teams"/>
    
    <category term="MDO" label="MDO"/>
    
    <category term="Safe Links" label="Safe Links"/>
    
    <category term="Telemetry" label="Telemetry"/>
    
  </entry>
  
  <entry>
    <title>Who Clicked Links in Teams</title>
    <link href="https://thoor.tech/detections/#det-who-clicked-links-teams" rel="alternate" type="text/html"/>
    <id>https://thoor.tech/detections/#det-who-clicked-links-teams</id>
    <updated>2026-03-31T16:03:09+02:00</updated>
    <summary>Exposure view showing Teams workload click activity over the last 7 days. Extracts the URL domain for easier pivoting and includes NetworkMessageId for correlation during investigations.</summary>
    <category term="Defender for Office 365" label="Product: Defender for Office 365"/>
    
    <category term="Initial Access" label="Tactic: Initial Access"/>
    
    
    <category term="T1204" label="MITRE: T1204"/>
    
    
    <category term="UrlClickEvents" label="Data Source: UrlClickEvents"/>
    
    
    <category term="Teams" label="Teams"/>
    
    <category term="MDO" label="MDO"/>
    
    <category term="Click Tracking" label="Click Tracking"/>
    
    <category term="User Execution" label="User Execution"/>
    
  </entry>
  
</feed>
