Possible Phishing with CSL and Network Sessions

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query looks for malicious URL clicks in phishing email recognized by MDO in correlation with CommonSecurityLogs(CSL) & NetworkSession events. If your workspace doesnt have one of the many data sources required for ASIM it may give informational error which can be safely ignored.

Attribute Value
Type Analytic Rule
Solution Microsoft Defender XDR
ID 6c3a1258-bcdd-4fcd-b753-1a9bc826ce12
Severity Medium
Status Available
Kind Scheduled
Tactics InitialAccess, CommandAndControl
Techniques T1566, T1102
Required Connectors MicrosoftThreatProtection, Zscaler, Fortinet, CheckPoint, PaloAltoNetworks, AWSS3, WindowsForwardedEvents, SecurityEvents, WindowsSecurityEvents, MicrosoftSysmonForLinux, AzureNSG, AzureMonitor(VMInsights), AIVectraStream
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AlertEvidence ActionType == "BrowserLaunchedToOpenUrl" ?
CommonSecurityLog ?
DeviceEvents ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Microsoft Defender XDR