Skip to content

Create Device_LocateMaliciousFile#33

Open
opeyemienitan wants to merge 1 commit intoreprise99:mainfrom
opeyemienitan:main
Open

Create Device_LocateMaliciousFile#33
opeyemienitan wants to merge 1 commit intoreprise99:mainfrom
opeyemienitan:main

Conversation

@opeyemienitan
Copy link

This query filters DeviceFileEvents for a given malicious file name and extension within the last 30 days. It projects key attributes such as event time, action type, device details, file origin URL, folder path, and initiating user UPN to support security investigations.

@opeyemienitan
Copy link
Author

opeyemienitan commented Jun 10, 2025

Hi @reprise99 – Hi! This is my first contribution to the project. I’ve added a KQL query to help identify malicious file events in Microsoft Defender. Please let me know if any changes are needed. Happy to improve it!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant