A collection of ready-to-use KQL queries for threat hunting, detection, and analytics in Microsoft Defender for Endpoint and Azure Sentinel.
Hunting-Queries-Detection-Rules is a curated repository of Kusto Query Language (KQL) queries specifically designed for Microsoft Defender for Endpoint and Azure Sentinel. It provides security teams with ready-to-use detection rules, hunting queries, and analytics to identify threats that may not be caught by default security alerts. The project aims to increase detection coverage by leveraging the rich log data available in Microsoft's security products.
Security analysts, threat hunters, and SOC teams working with Microsoft Defender for Endpoint and Azure Sentinel who need to write or customize detection queries. It's also valuable for security engineers building detection-as-code pipelines.
It saves significant time by offering a large collection of pre-vetted, community-contributed queries mapped to real-world threats and MITRE ATT&CK tactics. Instead of building queries from scratch, teams can deploy these immediately to enhance their security posture.
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Offers hundreds of out-of-the-box KQL queries for immediate use in Advanced Hunting and Custom Detection, spanning Defender for Endpoint, Identity, Cloud Apps, and Sentinel.
Queries are categorized and mapped to MITRE ATT&CK tactics, providing structured threat detection and hunting aligned with industry standards.
Includes queries from top security professionals with a clear detection template and pull request process, ensuring ongoing updates and diverse threat coverage.
Supplements queries with KQL functions, regex examples, and links to detailed blogs, aiding in learning and customization for security analysts.
Queries are exclusively designed for Microsoft's KQL and security products, rendering them useless for teams using other SIEMs or query languages.
Even pre-built queries need adjustments for specific environments, such as changing timestamp fields between Sentinel and Defender, as noted in the README.
As a community-driven repository, there's no guaranteed SLA or direct Microsoft support, which could pose risks for critical production deployments.