All Things Computers
1 min readJul 5, 2023

Over 600 Free KQL Detections, Rules, Threat Hunts and Queries for Microsoft Azure Sentinel

Azure Sentinel, Microsoft's cloud-native security information and event management (SIEM) platform, offers powerful capabilities for monitoring and securing your organization's infrastructure. One of the key features of Azure Sentinel is its ability to create custom detection rules using the Kusto Query Language (KQL). In this article, we will explore some rules that have been researched and developed for Azure Sentinel, while emphasizing the importance of tailoring them to suit your specific environment and requirements. These rules are intended to serve as a starting point for organizations looking to enhance their security operations and are open for anyone to use, with appropriate credit given to the original author.

These have been created and tested on online sample datasets which may limit the false postal I can remove

https://github.com/AllThingsComputers/Sentinel-Rules

DISCLAIMER: Please note that these rules are still in development and should not be solely relied upon. It is crucial to adapt and customize these rules according to your unique environment and security needs

All Things Computers
All Things Computers

Written by All Things Computers

Providing support for software development, data science, AI/Machine Learning, CyberSecurity, threat hunting and hacking.

No responses yet