← Back to SOC feed Coverage →

Can Be Onboarded Devices

kql MEDIUM Azure-Sentinel
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-08T23:00:01Z · Confidence: medium

Hunt Hypothesis

Devices that have been detected by Microsoft Defender for Endpoint but are not yet onboarded may indicate potential unmanaged or compromised endpoints that could be used as entry points. SOC teams should proactively hunt for these devices to identify and secure potential attack vectors before they are exploited.

KQL Query

// Can Be Onboarded devices
let CanBeOnboarded = "Can be onboarded";
DeviceInfo
| summarize arg_max(Timestamp, *) by DeviceId
| where OnboardingStatus == CanBeOnboarded

Analytic Rule Definition

id: 90f30a21-5de6-4c5e-85cf-d81347361aec
name: Can Be Onboarded Devices
description: |
  This query surfaces devices that were discovered by Microsoft Defender for Endpoint and can be onboarded
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceInfo
tactics:
- Resource Development
- Initial Access
relevantTechniques: []
query: |
  // Can Be Onboarded devices
  let CanBeOnboarded = "Can be onboarded";
  DeviceInfo
  | summarize arg_max(Timestamp, *) by DeviceId
  | where OnboardingStatus == CanBeOnboarded

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Device Inventory/Can Be Onboarded Devices.yaml