You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Purpose - This will generate a list of all the assets sending Windows Security logs to Sentinel.
SecurityEvent | where TimeGenerated > ago(1d) | summarizecount() by Computer
Process Creation Windows Event
Purpose - This will generate a list of all the assets sending Process Creation events including the CommandLine field. The CommandLine field is essential for analysis and correlation.
SecurityEvent | where TimeGenerated > ago(1d) | where EventID == 4688 | whereisnotempty(CommandLine) | summarizecount() by Computer
Events by computer
Purpose - This will generate a list of all the assets sending any Windows logs to Sentinel. This will capture hosts that are sending System and Application logs but not Security logs.
Event | where TimeGenerated > ago(1d) | summarizecount() by Computer
Logon events
Purpose - This will generate a list of all the assets sending Windows Logon events.
SecurityEvent | where TimeGenerated > ago(7d) | where EventID == 4624 | summarizecount() by Computer
Sysmon events
Purpose - This will generate a list of all the assets sending Windows Sysmon Process Created logs to Sentinel.
Event | where Source == "Microsoft-Windows-Sysmon" | where TimeGenerated > ago(1d) |where EventID == 1 | summarizecount()
Powershell events
Purpose - This will generate a list of all the assets sending Windows PowerShell logs to Sentinel.
Event | where TimeGenerated > ago(7d) | where Source == "PowerShell" | summarizecount()
Kerberos service ticket was requested
Purpose - This will generate a list of all the assets sending Windows Kerberos related logs to Sentinel. This is an essential log for detecting attacks such as Kerberoasting.
SecurityEvent | where TimeGenerated > ago(1d) | where EventID == 4769 | summarizecount()
Office Summary
Purpose - This will generate a list of all the Office services sending logs such as SharePoint and OneDrive.
OfficeActivity | summarizecount() by RecordType
All security alerts coming in by product name
Purpose - This will generate a list of all Azure security products sending logs into Sentinel.
SecurityAlert | where TimeGenerated > ago(7d) | summarize count() by ProductName
Security events by activity
Purpose - This will generate a list of all Windows Security logs by thei Event ID and Description. This allows for a check on high volume log sources that may be of low value in a security context.
SecurityEvent | summarizecount() by Activity
Summary of Billable Logs
Purpose - This will generate a graph showing a breakdown of logs and their volumes.