Use shared queries in advanced hunting

Applies to:

Want to experience Microsoft Defender ATP? Sign up for a free trial.

Advanced hunting queries can be shared among users in the same organization. You can also find queries shared publicly on GitHub. These queries let you quickly pursue specific threat hunting scenarios without having to write queries from scratch.

Image of shared queries

Save, modify, and share a query

You can save a new or existing query so that it is only accessible to you or shared with other users in your organization.

  1. Type a new query or load an existing one from under Shared queries or My queries.

  2. Select Save or Save as from the save options. To avoid overwriting an existing query, choose Save as.

  3. Enter a name for the query.

    Image of saving a query

  4. Select the folder where you'd like to save the query.

    • Shared queries — shared to all users in the your organization
    • My queries — accessible only to you
  5. Select Save.

Delete or rename a query

  1. Right-click on a query you want to rename or delete.

    Image of delete query

  2. Select Delete and confirm deletion. Or select Rename and provide a new name for the query.

To generate a link that opens your query directly in the advanced hunting query editor, finalize your query and select Share link.

Access queries in the GitHub repository

Microsoft security researchers regularly share advanced hunting queries in a designated public repository on GitHub. This repository is open to contributions. To contribute, join GitHub for free.

Tip

Microsoft security researchers also provide advanced hunting queries that you can use to locate activities and indicators associated with emerging threats. These queries are provided as part of the threat analytics reports in Microsoft Defender Security Center.