Linked Malicious Storage Artifacts

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query identifies the additional files uploaded by the same IP address which triggered a malware alert for malicious content upload on Azure Blob or File Storage Container.

Attribute Value
Type Analytic Rule
Solution Microsoft Defender for Cloud Apps
ID b9e3b9f8-a406-4151-9891-e5ff1ddd8c1d
Severity Medium
Status Available
Kind Scheduled
Tactics CommandAndControl, Exfiltration
Techniques T1071, T1567
Required Connectors MicrosoftCloudAppSecurity
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
SecurityAlert ?
StorageBlobLogs ?
StorageFileLogs ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Microsoft Defender for Cloud Apps