Plugins/Community Based Plugins/Microsoft Defender XDR Custom Plugin Scenarios/MDA Advanced Threat Protection (ATP) Detection/MDA_Advanced_Threat_Protection_Detection.yaml (86 lines of code) (raw):

Descriptor: Name: MDAAdvancedThreatProtection DisplayName: MDA Advanced Threat Protection Description: Skills to query MDA tables to get insights about files quarantined by Advanced Threat Protection (ATP) SkillGroups: - Format: KQL Skills: - Name: GetCloudAppATPEvents DisplayName: Get Cloud App ATP Events Description: Fetches a list of Advanced Threat Protection events within a specified timeframe ExamplePrompt: - 'OneDrive Malware' - 'SharePoint Malware' - 'Cloud App ATP' - 'Cloud App Advanced Threat Protection' - 'Get a list of Advanced Threat Protection malware events from Cloud Apps for the past 24 hours' - 'Get a list of Advanced Threat Protection malware events from Cloud Apps for the past 30 days' - 'Get a list of ATP malware events from Cloud Apps for the past 24 hours' - 'Get a list of ATP malware events from Cloud Apps for the past 30 days' - 'Fetch a list of Advanced Threat Protection malware events from Cloud Apps for the past 24 hours' - 'Fetch a list of Advanced Threat Protection malware events from Cloud Apps for the past 30 days' - 'Fetch a list of ATP malware events from Cloud Apps for the past 24 hours' - 'Fetch a list of ATP malware events from Cloud Apps for the past 30 days' - 'List the Advanced Threat Protection malware events from Cloud Apps for the past 24 hours' - 'List the Advanced Threat Protection malware events from Cloud Apps for the past 30 days' - 'List the ATP malware events from Cloud Apps for the past 24 hours' - 'List the ATP malware events from Cloud Apps for the past 30 days' Inputs: - Name: hourorday Description: hours (h) or days (d) Required: false DefaultValue: d - Name: unit Description: number of hours or days Required: false DefaultValue: 7 Settings: Target: Defender Template: |- CloudAppEvents | where Timestamp >= ago({{unit}}{{hourorday}}) | where ActionType == @"AtpDetection" | extend FileName=parse_json(RawEventData).FileData.FileName, FilePath=parse_json(RawEventData).FileData.FilePath, MalwareFamily=parse_json(RawEventData).FileData.MalwareFamily | project Timestamp, ActionType, Application, AccountObjectId, AccountDisplayName, FileName, FilePath, MalwareFamily - Format: KQL Skills: - Name: GetOfficeActivityATPEvents DisplayName: Get Office Activity ATP Events Description: Fetches a list of Advanced Threat Protection events within a specified timeframe ExamplePrompt: - 'OneDrive Malware' - 'SharePoint Malware' - 'Office Activity ATP' - 'Office Activity Advanced Threat Protection' - 'Get a list of Advanced Threat Protection malware events from Office Activity for the past 24 hours' - 'Get a list of Advanced Threat Protection malware events from Office Activity for the past 30 days' - 'Get a list of ATP malware events from Office Activity for the past 24 hours' - 'Get a list of ATP malware events from Office Activity for the past 30 days' - 'Fetch a list of Advanced Threat Protection malware events from Office Activity for the past 24 hours' - 'Fetch a list of Advanced Threat Protection malware events from Office Activity for the past 30 days' - 'Fetch a list of ATP malware events from Office Activity for the past 24 hours' - 'Fetch a list of ATP malware events from Office Activity for the past 30 days' - 'List the Advanced Threat Protection malware events from Office Activity for the past 24 hours' - 'List the Advanced Threat Protection malware events from Office Activity for the past 30 days' - 'List the ATP malware events from Office Activity for the past 24 hours' - 'List the ATP malware events from Office Activity for the past 30 days' Inputs: - Name: hourorday Description: hours (h) or days (d) Required: false DefaultValue: d - Name: unit Description: number of hours or days Required: false DefaultValue: 7 Settings: Target: Sentinel Template: |- OfficeActivity | where TimeGenerated >= ago({{unit}}{{hourorday}}) | where Operation == "FileMalwareDetected" and RecordType == "SharePointFileOperation" | project TimeGenerated, Operation, OfficeWorkload, OfficeObjectId, ClientIP, Site_Url, SourceRelativeUrl, SourceFileName TenantId: <your_tenant_id> SubscriptionId: <your_subscription_id> ResourceGroupName: <your_rg_name> WorkspaceName: <your_ws_name>