Webserver Executing Suspicious Applications

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query looks for common webserver process names and identifies any processes launched using a scripting language (cmd, powershell, wscript, cscript).

Attribute Value
Type Hunting Query
Solution Microsoft Defender XDR
ID 761230a3-71ad-4522-bfbc-1dca698ffc42
Tactics Execution
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceProcessEvents ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Microsoft Defender XDR