Showing posts with label Microsoft Sentinel. Show all posts
Showing posts with label Microsoft Sentinel. Show all posts

Threat Hunting: Unveiling the Ghosts in the Machine with Corelight and Microsoft Sentinel

The digital realm is a battlefield. Not just for the attackers who claw at the gates, but for the defenders who patrol its darkened corridors. In this war, intel is everything. But have you ever wondered if you have what it takes to be the one hunting the predators, rather than just being the prey? Today, we're not just discussing the theory; we're diving deep into the practicalities, dissecting a simulated attack. We'll weave together the threads of network evidence and endpoint telemetry, using the potent combination of Corelight and Microsoft Defender 365, orchestrated through Microsoft Sentinel. Forget the passive watch tower; this is about proactive engagement, about understanding the enemy's playbook so you can dismantle it before it causes irreparable damage.

This isn't about finding the obvious malware signature; it's about spotting the subtle anomaly, the whisper in the server logs, the digital footprint of an intruder who believes they're invisible. It's about piecing together fragments of data to reconstruct a narrative of compromise, and then neutralizing the threat before it escalates. Welcome to the heart of Sectemple – where we transform curiosity into capability, and passive observation into aggressive defense.

The landscape of cybersecurity is a relentless tide of evolving threats. Attackers, fueled by desperation or pure malice, are constantly devising new ways to breach defenses. They are the shadows, the ghosts in the machine, operating in the blind spots that every organization inevitably possesses. But what if you could turn the tables? What if you could leverage sophisticated tools and methodologies to hunt these adversaries down, to understand their motives, their tactics, and their ultimate goals? That's the essence of threat hunting – transforming your security posture from a reactive fire brigade into a pre-emptive strike force.

The Unseen Enemy: Why Traditional Defenses Aren't Enough

For years, we've relied on perimeter security, firewalls, intrusion detection systems – the metaphorical castle walls. These are essential, don't get me wrong. They're the first line of defense, designed to keep out the known threats. But the modern attacker isn't lumbering through the main gate anymore. They're finding the unlocked window, the back alley entrance, the cleverly disguised social engineering ploy. They dwell within your network, moving laterally, exfiltrating data, and often remaining undetected for months.

This is where the limitation of traditional security solutions becomes apparent. They are designed to detect known bad, not to uncover the unknown good. They excel at flagging blatant violations, but they often miss the subtle, insidious actions of a determined adversary who understands your systems better than you do.

Consider the sheer volume of data generated by a corporate network. Logs from firewalls, servers, endpoints, applications – it's an ocean of information. Sifting through this manually is an impossible task. Automated tools can help, but they are often tuned to look for specific signatures, leaving a vast expanse of potentially malicious activity unchecked.

"The greatest security is not having a firewall, but knowing where the fire is and how to put it out before it spreads." - Unknown Architect of Digital Fortresses

This is the crucial gap that threat hunting aims to fill. It’s not about replacing your existing security stack; it’s about augmenting it. It’s about empowering your security team with the mindset and the tools to proactively search for threats that have bypassed or are evading your automated defenses.

The Hunter's Arsenal: Corelight, Microsoft Defender 365, and Sentinel

To effectively hunt, you need the right tools. Today’s digital detective relies on a sophisticated arsenal, and the synergy between network and endpoint data is paramount. This is where the combination of Corelight, Microsoft Defender 365, and Microsoft Sentinel shines.

Corelight: The Network's Nervous System

Corelight, built on the open-source Zeek (formerly Bro) framework, provides unparalleled visibility into network traffic. It doesn't just log packets; it interprets them, creating rich, structured data logs that detail connections, protocols, file transfers, and even suspicious command-line arguments. Think of it as the network's nervous system, providing detailed insights into every interaction happening across your infrastructure. This data is invaluable:

  • Connection Details: Source and destination IPs, ports, duration, and volume of data transfer.
  • Protocol Analysis: Deep inspection of application-layer protocols like HTTP, DNS, SMB, and more.
  • File Extraction: Captures and analyzes files transmitted over the network.
  • Behavioral Insights: Identifies unusual connection patterns or protocol anomalies.

Microsoft Defender for Endpoint (MDE): The Eyes on the Ground

While Corelight watches the network highways, Microsoft Defender for Endpoint (MDE) is your eyes and ears on the individual machines – the endpoints. MDE provides robust endpoint detection and response (EDR) capabilities. It monitors processes, file activity, registry changes, and network connections originating from endpoints. This telemetry is critical for understanding what's happening *on* a machine during a suspected intrusion.

  • Advanced Threat Detection: Machine learning and behavioral analytics to spot novel threats.
  • Endpoint Investigations: Rich post-breach forensic data, including process trees and network connections.
  • Vulnerability Management: Identifies weaknesses on endpoints that attackers could exploit.
  • Attack Surface Reduction: Tools to block malware and malicious activities before they execute.

Microsoft Sentinel: The Intelligence Hub

Bringing these two powerful data sources together is Microsoft Sentinel, a cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) solution. Sentinel ingests logs from a vast array of sources, including Corelight and MDE, and uses its analytics engine to correlate events, detect threats, and automate responses.

  • Unified Data Ingestion: Connects to both cloud and on-premises data sources.
  • Intelligent Analytics: Leverages AI and machine learning for threat detection.
  • Automated Playbooks: Orchestrates responses to detected threats.
  • Threat Hunting Interface: Provides a powerful query interface for proactive investigation.

When you combine the granular network insights from Corelight with the deep endpoint telemetry from MDE, and feed it all into Sentinel, you create a comprehensive view of an incident. You can trace an attack from its initial network ingress, through its lateral movement across endpoints, to its final objective.

Anatomy of a Simulated Attack: A Threat Hunter's Perspective

Let's walk through a hypothetical (but realistic) scenario. Imagine an attacker gains initial access through a phishing email containing a malicious attachment on a user's workstation. This is where the hunt begins.

Phase 1: Initial Access and Reconnaissance

The user clicks the attachment, which executes a payload. This payload might be a simple dropper, or it could be more sophisticated, establishing a reverse shell or downloading a more advanced implant. From the MDE perspective, we'd see an unusual process spawning from a legitimate application (e.g., Word or Outlook). We'd monitor its network connections and any outbound communication.

Corelight, meanwhile, would log the connection initiated by the workstation. We'd see the destination IP, the port used, and the protocol. If the attacker is scanning the internal network for further targets, Corelight would log this reconnaissance activity – perhaps using SMB or RDP to probe other machines. Sentinel would correlate these events: the suspicious process on the endpoint from MDE, and the unusual network connections logged by Corelight, flagging this as a potential high-fidelity alert.

Phase 2: Lateral Movement

The attacker now aims to move deeper into the network. They might use stolen credentials, exploit a vulnerability, or leverage administrative tools to access other machines. MDE would detect the abnormal login attempt or the exploit execution on a new endpoint. Simultaneously, Corelight would log the connection between the compromised machine and the new target, detailing the protocol (e.g., SMB for file sharing or RDP for remote desktop).

Sentinel's role here is crucial. By correlating the MDE alert on the target machine with the Corelight logs showing the connection *from* the initially compromised host, the threat hunter can confidently identify the lateral movement. This is far more powerful than just seeing an alert on one machine in isolation. You're seeing the attacker's path.

Phase 3: Objective Execution (Data Exfiltration)

The attacker's goal might be data theft. They'll locate sensitive files, consolidate them, and then attempt to exfiltrate them. MDE would observe the unusual file access and potential staging of data. More importantly, it would see any attempts to compress or encrypt large volumes of data, or to establish outbound connections to suspicious external IPs.

Corelight would provide visibility into the outbound data transfer. We could analyze the volume, the destination, and potentially even extract the files being transferred if they are unencrypted. Sentinel enables the threat hunter to query logs for patterns indicative of exfiltration: large outbound transfers to unusual destinations, use of non-standard ports for data egress, or connections to known command-and-control (C2) infrastructure.

The Threat Hunter's Mindset: Beyond the Alerts

Being a threat hunter isn't just about mastering tools. It's about adopting a specific mindset. It requires:

  • Curiosity: Always asking "what if?" and "why is this happening?"
  • Skepticism: Not taking logs at face value, but questioning anomalies.
  • Methodology: Having a structured approach to investigations, from hypothesis to remediation.
  • Technical Depth: Understanding operating systems, networks, and common attack techniques.
  • Data Fluency: Being able to query, analyze, and interpret large datasets effectively.

Threat hunting is about looking for the 'unknown unknowns' – the threats that no one anticipated. It's a continuous process of hypothesis generation, data collection, analysis, and refinement. You hypothesize that an attacker might be using a specific C2 channel, then you query Corelight logs for connections to suspicious IPs on unusual ports. You hypothesize that an insider is exfiltrating data, then you examine MDE logs for large data movements and Corelight logs for unusual outbound transfers.

Veredicto del Ingeniero: ¿Estás Listo para Cazar?

The tools we've discussed – Corelight, MDE, and Sentinel – represent the cutting edge of threat detection and response. They provide the visibility and intelligence needed to hunt effectively. However, owning the best tools doesn't automatically make you a great hunter. It requires dedication, continuous learning, and a willingness to think like the adversary.

The question isn't just "Could you be a threat hunter?" It's "Are you willing to commit to the relentless pursuit of truth in the digital shadows?" The attackers aren't resting. Neither can the defenders. Investing in these technologies is a significant step, but the true power lies in the human element – the analyst who knows how to wield them, who possesses the analytical prowess to see patterns where others see noise.

Arsenal del Operador/Analista

  • Corelight: For deep network visibility and Zeek logs.
  • Microsoft Defender for Endpoint: For comprehensive endpoint telemetry and response.
  • Microsoft Sentinel: For SIEM/SOAR, data correlation, and proactive threat hunting queries.
  • KQL (Kusto Query Language): The language of Sentinel – essential for crafting effective hunt queries.
  • Python: For scripting custom analysis or automating tasks with log data.
  • Books: "The Microsoft Sentinel Playbook: Security Operations and Automation" for mastering the platform.
  • Certifications: Microsoft Certified: Security Operations Analyst Associate (SC-200) for validated skills.

Taller Práctico: Primeros Pasos en la Detección con Sentinel

Let's start with a simple hunt query in Microsoft Sentinel to search for unusual outbound SMB connections, a common lateral movement technique. This requires that you have Corelight data (or equivalent Zeek logs) and MDE data ingested into Sentinel.

  1. Hypothesize: Attackers often use SMB (port 445) to move laterally between Windows machines. Large or unusual SMB connections could indicate reconnaissance or data staging.

  2. Formulate Query: Navigate to the Logs section in Microsoft Sentinel and use KQL.

    
    SecurityConnection
    | where RemotePort == 445
    | where Direction == "Outbound"
    | summarize count() by SourceIp, RemoteIp, bin(TimeGenerated, 1h)
    | where count_ > 5  // Adjust threshold based on your network baseline
    | order by count_ desc
            
  3. Analyze Results: Examine the output. High counts from a single SourceIp to multiple RemoteIps within an hour could indicate scanning. High counts from one SourceIp to one RemoteIp could indicate large file transfers. Investigate any suspicious IPs or connections further using MDE and other Corelight logs.

  4. Refine: Add conditions to filter by specific processes if available in your logs, or correlate with other suspicious activities seen on the SourceIp from MDE data.

Preguntas Frecuentes

¿Qué es la diferencia entre IDS y Threat Hunting?

An Intrusion Detection System (IDS) is primarily reactive, alerting on known malicious signatures or policy violations. Threat hunting is proactive, actively searching for undetected threats based on hypotheses and behavioral analysis, even when no alert has fired.

Do I need Corelight specifically?

While Corelight provides excellent, structured Zeek logs, the principle applies to any robust network data source. The key is having rich, interpretable network telemetry ingested into your SIEM like Sentinel.

How much data can Microsoft Sentinel handle?

Sentinel is a cloud-native solution designed for scalability. It can ingest and analyze vast quantities of data from diverse sources, limited primarily by your Azure subscription's capacity and cost considerations.

El Contrato: Tu Próxima Misión de Caza

Now that you've seen the gears and levers of proactive defense, your mission, should you choose to accept it, is to consider your own network's visibility. Do you have the data? Do you have the tools? More importantly, do you have the *mindset*?

Your challenge: Identify one potential threat hunting hypothesis that is relevant to your environment (e.g., "Detecting suspicious RDP connections to servers outside business hours," or "Identifying unusual DNS queries to known malicious domains"). Then, outline the data sources you would need (network logs, endpoint logs, etc.) and the type of queries you might construct in a SIEM like Sentinel to test that hypothesis. Document your thought process. The digital shadows are vast; start by illuminating your own corner.

Microsoft Sentinel Threat Hunting: A Blue Team Masterclass

The digital realm is a battlefield, and silence is often the loudest indicator of impending chaos. In this silent war, information is your only weapon, and time is your most precious commodity. Microsoft Sentinel isn't just another SIEM; it's a strategic intelligence platform. Today, we're not breaking into systems; we're dissecting the shadow operations within them. We're going deep into threat hunting.

What is Threat Hunting?

Threat hunting is, at its core, a proactive, iterative approach to searching for threats that are currently undetected in your environment. It’s about moving beyond reactive alerts and delving into enriched data to uncover sophisticated adversaries. Think of it as a detective meticulously sifting through evidence, looking for clues that conventional security tools might have missed. Attackers are constantly evolving their tactics, techniques, and procedures (TTPs); threat hunting is our countermeasure to stay one step ahead.

This isn't about finding the obvious malware infection or the easily blocked phishing attempt. It's about identifying the subtle anomalies, the low-and-slow activities, the command-and-control channels hidden in plain sight. It requires a deep understanding of your network, your systems, and the adversary's mindset. It’s the ultimate exercise in defensive ingenuity.

Sentinel as Your Hunting Ground

Microsoft Sentinel, a cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) solution, transforms your vast telemetry into actionable intelligence. It consolidates logs from across your entire enterprise – from Azure and Microsoft 365 to on-premises servers and other cloud environments. This centralized view is the perfect hunting ground.

Sentinel's strength lies in its:

  • Scalability: Ingest and analyze massive datasets without breaking a sweat.
  • Intelligence Driven: Leverages Microsoft's threat intelligence and machine learning.
  • Kusto Query Language (KQL): A powerful, flexible language for data exploration and threat detection.
  • Built-in Analytics: Pre-built detection rules and hunting queries provide a solid starting point.
  • SOAR Capabilities: Automate responses to detected threats, freeing up analysts.

For analysts, Sentinel offers a robust environment to craft hypotheses, gather evidence, and hunt down elusive threats. Its integrated nature means you’re not just looking at logs; you’re looking at a correlated view of potential adversary actions.

Laying the Foundations: Data Ingestion

You can't hunt what you can't see. The first crucial step is ensuring comprehensive data ingestion into Microsoft Sentinel. Without adequate logs, your hunting expeditions will be blind. Prioritize the ingestion of data sources that provide deep insights into user activity, network traffic, and system processes.

Key data sources to consider:

  • Azure Activity Logs: For all subscription-level events.
  • Azure AD Sign-in & Audit Logs: Critical for user authentication and activity.
  • Microsoft 365 Defender Logs: Device, identity, email, and application security events.
  • Windows Security Event Logs: Process creation, logon events, privilege changes.
  • Sysmon: Provides granular system monitoring data.
  • Network Logs: Firewalls, proxy servers, WAFs.
  • Third-Party Data Connectors: For other cloud services or on-premises solutions.

Pro Tip: Regularly review your data connectors. Are you ingesting the right logs? Are they retention policies sufficient for historical analysis? A gap in ingestion is a gap in defense.

The Art of KQL: Crafting Detection Queries

Kusto Query Language (KQL) is your scalpel in the Sentinel operating theater. Mastering KQL is paramount for effective threat hunting. It allows you to drill down into specific events, correlate seemingly unrelated activities, and identify patterns indicative of malicious behavior.

Let's look at a common hunting scenario: identifying suspicious PowerShell activity.

Hunting for Suspicious PowerShell Execution

Hypothesis: Adversaries often use PowerShell for reconnaissance, lateral movement, and data exfiltration. We need to look for unusual PowerShell execution patterns, especially those involving encoded commands or network connections.

Consider this KQL query targeting PowerShell script block logging (Event ID 4104) and process creation (Event ID 1):


let psExec = SecurityEvent
| where EventID == 1 and (CommandLine has "powershell.exe" or CommandLine has "pwsh.exe");
let psScriptBlock = SecurityEvent
| where EventID == 4104;
psExec
| join kind=leftouter (
    psScriptBlock
    | extend ScriptBlockText=tostring(parse_json(RenderedDescription).ScriptBlockText)
    | where ScriptBlockText has_any ("DownloadString", "Invoke-WebRequest", "IEX", "encodedcommand") or isnotempty(ScriptBlockText) and strlen(ScriptBlockText) > 1000 // Look for large scripts or common malicious functions
) on $left.ComputerName == $right.ComputerName and $left.TimeGenerated > $right.TimeGenerated - 1m and $left.TimeGenerated < $right.TimeGenerated + 1m
| project TimeGenerated, ComputerName, CommandLine, InitiatingProcessCommandLine, User, ScriptBlockText
| summarize count() by ComputerName, User, CommandLine, InitiatingProcessCommandLine, ScriptBlockText
| where count_ > 1 // Filter for repeated executions or a process spawning a script block
| order by TimeGenerated desc

This query attempts to correlate process creation events with script block logging. It looks for PowerShell executions that might involve downloading content, using encoded commands, or running exceptionally long scripts – all potential indicators of malicious intent.

Remember, hunting is iterative. Your first query might be too broad or too narrow. Refine it based on the results and your growing understanding of the data.

Hunting for Specific Threats: Scenarios

Effective threat hunting often revolves around specific threat actor TTPs. Here are a few common scenarios you can implement in Sentinel:

Scenario 1: Detecting Mimikatz Activity

Hypothesis: Attackers use tools like Mimikatz to extract credentials from memory. We can hunt for suspicious LSASS access or specific command-line arguments associated with Mimikatz.


// Requires SecurityEvent logs with EventID 1 (Process Creation) and potentially DeviceProcessEvents from Microsoft 365 Defender
let mimikatz_keywords = dynamic(["mimikatz", "sekurlsa::logonpasswords", "sekurlsa::ms16-075", "lsadump::"]);
SecurityEvent
| where EventID == 1
| where CommandLine has_any (mimikatz_keywords)
| project TimeGenerated, ComputerName, CommandLine, User
| where User != "SYSTEM" // Exclude system processes if appropriate
| order by TimeGenerated desc

Scenario 2: Identifying Lateral Movement via PsExec

Hypothesis: PsExec is a common tool for lateral movement. We can hunt for PsExec usage, paying attention to the source and destination machines, and the commands executed.


// Requires SecurityEvent logs with EventID 1 (Process Creation)
SecurityEvent
| where EventID == 1 and CommandLine has "PSEXESvc.exe" // PSEXEC service executable
| project TimeGenerated, ComputerName, CommandLine, User, InitiatingProcessCommandLine
| where CommandLine contains "\\\\" // Look for remote execution syntax
| order by TimeGenerated desc

Note: Real-world PsExec detection often requires more sophisticated logic, including network flow data and potentially behavioral analysis, to distinguish legitimate use from malicious activity.

Scenario 3: Detecting External Reconnaissance Activity

Hypothesis: Attackers often scan external IP ranges or known malicious IPs before launching an attack. We can hunt for unusual outbound connections to suspicious destinations.


// Requires network flow logs (e.g., Azure Network Analytics, Firewall logs)
CommonSecurityLog
| where Direction == "Outbound"
| where DestinationPort has_any ("80", "443", "22", "3389") // Common ports
| extend RemoteIP = todynamic(RemoteIP) // Ensure RemoteIP is treated as an array if it's structured that way
| mv-expand RemoteIP
| where RemoteIP !startswith "192.168." and RemoteIP !startswith "10." and RemoteIP !startswith "172.16." // Filter out private IP ranges
// | join kind=inner (
//     // Join with threat intelligence feed for known malicious IPs (if available in Sentinel)
//     // ThreatIntelligenceIndicator
//     // | where isnotempty(IndicatorId)
// ) on $left.RemoteIP == $right.IndicatorId
| summarize count() by ComputerName, User, RemoteIP, DestinationPort, TimeGenerated
| where count_ > 5 // Threshold for suspicious activity
| order by TimeGenerated desc
"If you know the enemy and know yourself, you need not fear the result of a hundred battles."

Advanced Techniques and Automation

For seasoned hunters, Sentinel offers capabilities beyond simple KQL queries:

  • Hunting Workbooks: Create interactive dashboards to visualize hunting data and track trends over time.
  • Analytics Rules: Translate successful hunting queries into scheduled analytics rules to automate future detection.
  • Hunting Playbooks: Integrate with Azure Logic Apps (now Power Automate) to automate response actions when a hunting query yields results. For instance, isolating a compromised host or blocking a malicious IP.
  • Machine Learning: Leverage Sentinel's built-in ML capabilities for anomaly detection, or import custom ML models.

Automation is key to scaling your threat hunting operations. Manual hunting is essential for discovering novel threats, but automated rules ensure that known TTPs are caught consistently.

Analyst's Arsenal: Tools and Resources

While Sentinel is your primary platform, a well-equipped analyst needs more.

  • Microsoft 365 Defender Portal: For deep dives into endpoint, identity, email, and application security events.
  • Azure Portal: For managing Azure resources and their associated logs.
  • Threat Intelligence Platforms (TIPs): Integrate external threat feeds for enriched context.
  • Documentation: Microsoft Sentinel documentation is your bible. Stay updated.
  • Community Resources: Blogs, forums, and GitHub repositories dedicated to Sentinel and KQL are invaluable.

For those serious about mastering this domain, consider the official Microsoft certifications, such as the Microsoft Certified: Security Operations Analyst Associate (SC-200), which covers Sentinel extensively. While you can start with free resources, investing in paid tools and training often accelerates your expertise, allowing you to tackle more complex threats with confidence. Tools like Exabeam or Splunk Enterprise Security, while different platforms, offer similar defensive insights and are worth exploring for comparative analysis.

Engineer's Verdict: Is Sentinel Worth It?

Verdict: Indispensable for Azure-centric environments, powerful for hybrid.

Microsoft Sentinel is a force multiplier for organizations invested in the Microsoft ecosystem. Its tight integration with Azure AD, Microsoft 365, and other Microsoft security products is unparalleled. The cloud-native architecture offers immense scalability and flexibility. KQL is a powerful query language, though it has a learning curve.

Pros:

  • Seamless integration with Microsoft services.
  • Strong cloud scalability and performance.
  • Powerful KQL for deep-dive analysis.
  • Integrated SOAR capabilities.
  • Leverages Microsoft's vast threat intelligence.

Cons:

  • Can be complex to configure comprehensively.
  • Cost can escalate with high data ingestion volumes.
  • KQL has a learning curve for beginners.
  • Less flexible for strictly non-Microsoft or highly niche environments compared to some dedicated third-party solutions.

If your organization lives within the Microsoft cloud, Sentinel is not just an option; it's a strategic imperative for robust security operations. For hybrid environments, it requires careful planning but remains a highly capable solution.

Frequently Asked Questions

What's the difference between a SIEM and threat hunting?

A SIEM (like Sentinel in its SIEM role) collects, aggregates, and analyzes logs to alert on known threats and compliance issues. Threat hunting is a proactive, human-driven process that goes beyond automated alerts to search for previously undetected threats.

How often should I hunt for threats?

Ideally, threat hunting should be a continuous or at least a regular, scheduled activity. The frequency depends on your risk appetite, industry, and available resources. Start with weekly hunts for critical TTPs and scale from there.

Do I need specialized tools for threat hunting in Sentinel?

Sentinel itself is the primary tool. However, strong analytical skills, knowledge of KQL, understanding of attacker TTPs, and access to relevant data are essential. External threat intelligence feeds can also augment your hunting efforts.

Is threat hunting just for large enterprises?

No. While the scope and sophistication may vary, the principles of proactive threat searching are applicable to organizations of all sizes. Even with limited resources, focusing on high-impact TTPs with basic KQL queries can yield significant defensive value.

The Contract: Securing Your Digital Frontier

The digital landscape is in constant flux, a shadowy world where threats lurk in unexpected corners. Microsoft Sentinel provides the illuminated battlefield, but it is your vigilance, your analytical prowess, and your willingness to chase down anomalies that will truly secure your perimeter. This isn't just about deploying technology; it's about cultivating a defensive mindset. Craft your hypotheses, refine your KQL queries, and never stop asking "What if?" The attackers aren't sleeping, and neither can you. Now, go forth and hunt.

Your challenge: Identify a specific stealthy technique used by modern adversaries (e.g., process injection, credential dumping via non-Mimikatz methods, or data staging). Formulate a hypothesis and develop a basic KQL query in Sentinel (or a conceptual equivalent) to detect it. Detail your query and its rationale in the comments below. Let's refine our collective hunting skills.