Proactively hunt for threats with advanced hunting
Want to experience Microsoft Defender ATP? Sign up for a free trial.
Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate interesting indicators and entities. The flexible access to data facilitates unconstrained hunting for both known and potential threats.
You can use the same threat-hunting queries to build custom detection rules. These rules run automatically to check for and respond to various events and system states, including suspected breach activity and misconfigured machines.
Get started with advanced hunting
Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast.
You can also go through each of the following steps to ramp up your advanced hunting knowledge.
|Get a feel for the language||Advanced hunting is based on the Kusto query language, supporting the same syntax and operators. Start learning the query language by running your first query.||Query language overview|
|Understand the schema||Get a good, high-level understanding of the tables in the schema and their columns. This will help you determine where to look for data and how to construct your queries.||Schema reference|
|Use predefined queries||Explore collections of predefined queries covering different threat hunting scenarios.||Shared queries|
|Learn about custom detections||Understand how you can use advanced hunting queries to trigger alerts and apply response actions automatically.||Custom detections overview|
Get help as you write queries
Take advantage of the following functionality to write queries faster:
- Autosuggest — as you write queries, advanced hunting provides suggestions.
- Schema reference — a schema reference that includes the list of tables and their columns is provided next to your working area. For more information, hover over an item. Double-click an item to insert it to the query editor.
Drilldown from query results
To view more information about entities, such as machines, files, users, IP addresses, and URLs, in your query results, simply click the entity identifier. This opens a detailed profile page for the selected entity in Microsoft Defender Security Center.
Tweak your queries from the results
Right-click a value in the result set to quickly enhance your query. You can use the options to:
- Explicitly look for the selected value (
- Exclude the selected value from the query (
- Get more advanced operators for adding the value to your query, such as
Filter the query results
The filters displayed to the right provide a summary of the result set. Each column has its own section that lists the distinct values found for that column and the number of instances.
Refine your query by selecting the "+" or "-" buttons next to the values that you want to include or exclude.
Once you apply the filter to modify the query and then run the query, the results are updated accordingly.