SecurityIncidentSecurityAlert

Alert Efficiency

EntraIdSignInEvents

Entra Id Sign In Events Suspicious User Agent

EntraIdSignInEvents

Entra Id Sign In Events Hunting Potential Seamless SSO Usage

DeviceEventsDeviceNetworkInfo

Windows Summarise Firewall Outbound Blocks By Firewall Profile

DeviceEventsDeviceNetworkInfo

Windows Outbound Firewall Blocks Filter By Device And Firewall Profile

DeviceEventsDeviceNetworkInfo

Windows Outbound Firewall Blocks Filtered By Firewall Profile

DeviceEventsDeviceNetworkInfo

Windows Windows Firewall Outbound Blocked Connections

AuditLogs

Security Copilot Agent Deleted

DeviceNetworkEvents

Windows Find Net BIOS Name Service NBNS Usage UDP 137

EmailEventsEmailUrlInfo

Applying Shanon Entropy To Sender Domains Via Kusto

DeviceEvents

Windows All Firewall Inbound Block Events Last 100

IdentityLogonEvents

Windows Detect NTLM Usage In The Environment

DeviceEvents

Windows Inbound Firewall Blocks By Process

DeviceTvmSoftwareVulnerabilitiesDeviceProcessEventsDeviceFileEvents+2

CVE 2026 21510 Windows Shell Security Feature Bypass

EntraUsers

Detection Enrichment Entra User

EntraGroupMembershipsEntraGroups

Detection Enrichment Entra Group Membership

DeviceNetworkEvents

Device IP History

MessageEventsMessageUrlInfo

Detect Malicious Teams Message

MessageEventsIdentityInfo

Detect Possible Teams Bec Attack By High Teams Recipients

MessageEventsIdentityInfoMessageUrlInfo

Detect External User Sending Suspicious Link To Multiple Users

DeviceRegistryEvents

Image File Execution Options IFEO Or Silent Process Exit Registry Modification

DeviceFileEvents

Malicious Browser Extension Downloads Using Device File Events

SigninLogsAADNonInteractiveUserSignInLogs

Detect Potential Consent Fix O Auth Authorisation Code Theft Attempts

AuditLogs

MCP Server Registered To Entra

AuditLogs

Privileged Role Assignment Outside Of PIM

MicrosoftGraphActivityLogs

Azurekid Blackcat Security Module Activity

StorageBlobLogs

Potential Storage Enumeration Or Brute Force Attack

AuditLogs

Service Principal Added To Global Administrator Role

AzureActivityAuditLogs

Unauthorized Federated Credential Added To Managed Identity

AADServicePrincipalSignInLogs

Service Principal Sign In From New Country

StorageBlobLogs

Anonymous Retrieval Of Azure Blob Versions

AuditLogs

Service Principal Adds Client Secret To Target Application

StorageFileLogs

Successful Azure Storage File Access From Unauthorized Geo Location

MicrosoftGraphActivityLogs

Service Principal Enumeration Of App Role Assignments

AuditLogs

Granting Of High Risk Privilege Escalation Permissions To Service Principal

DeviceProcessEvents

Notepad Chrysalis Backdoor Gupexe Spawned Binaries Excluding Known Good Notepad Hashes

DeviceNetworkEvents

Notepad Chrysalis Backdoor Gupexe Detection

DeviceProcessEventsDeviceNetworkEvents

Notepad Chrysalis Backdoor Spawned Binaries Network Connections Correlation

DeviceInfoDeviceTvmInfoGatheringDeviceEvents

Windows Trigger Full Scan For Devices That Have Not Completed One Windows Clients Only

SigninLogs

Emergency Access Usage Alert

IdentityLogonEventsIdentityInfo

Auto Disable High Risk AD User

DeviceTvmInfoGatheringDeviceEvents

Windows Trigger Full Scan For Devices That Have Not Completed One

AuditLogs

Azure RBAC Elevation Via User Access Admin Toggle

DeviceTvmInfoGatheringDeviceEvents

Windows Recent Devices Missing Full Scan

DeviceInfoDeviceNetworkEvents

Linux Desktop Public Egress Baseline Low Noise

DeviceInfoDeviceFileEvents

Linux File Activity Baseline

DeviceInfoDeviceLogonEvents

Linux Logon Activity

DeviceInfoDeviceEventsDeviceProcessEvents+3

Linux Action Type Inventory All Tables

DeviceInfoDeviceNetworkEvents

Linux Network Events Baseline Report Id Dedupe

DeviceProcessEventsDeviceNetworkEvents

Linux Archive Command Followed By Upload Egress