← Back to SOC feed Coverage →

Find Software By Name and Version

kql MEDIUM Azure-Sentinel
TExploitation for Client Execution
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-08T23:00:01Z · Confidence: medium

Hunt Hypothesis

Adversaries may use specific software names and versions to execute malicious payloads or maintain persistence through client-side exploitation. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential exploitation attempts and mitigate lateral movement risks.

KQL Query

//
let SearchSoftwareName = "chrome";
let SoftwareKnownVersion = "10";
DeviceTvmSoftwareInventory
// to surface software that the version is not discovered for, remove SoftwareVersion filtering
| where SoftwareName == SearchSoftwareName
| where SoftwareVersion startswith SoftwareKnownVersion

Analytic Rule Definition

id: 929d1046-11a9-40c1-977e-bd1984b30c31
name: Find Software By Name and Version
description: |
  This query finds a software by name and/or version
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceTvmSoftwareInventory
tactics:
- Initial Access
- Execution
relevantTechniques:
- Exploitation for Client Execution
query: |
  //
  let SearchSoftwareName = "chrome";
  let SoftwareKnownVersion = "10";
  DeviceTvmSoftwareInventory
  // to surface software that the version is not discovered for, remove SoftwareVersion filtering
  | where SoftwareName == SearchSoftwareName
  | where SoftwareVersion startswith SoftwareKnownVersion

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Device Inventory/Find Software By Name and Version.yaml