← Back to SOC feed Coverage →

Most Common Services

kql MEDIUM Azure-Sentinel
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-08T23:00:01Z · Confidence: medium

Hunt Hypothesis

Adversaries may leverage commonly used services to establish persistent access or exfiltrate data undetected. SOC teams should proactively hunt for unusual activity within these common services to identify potential compromise in their Azure Sentinel environment.

KQL Query

//
DeviceTvmSoftwareVulnerabilities 
| where ingestion_time() > ago(7d)
| summarize arg_max(DeviceId, *) by SoftwareVendor, SoftwareName
| summarize DiscoveredOnDevicesCount = dcount(DeviceId) by SoftwareVendor, SoftwareName

Analytic Rule Definition

id: 4a5e9079-8fca-451a-99f5-a3384755a6e8
name: Most Common Services
description: |
  This query provides the most common services discovered
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceTvmSoftwareVulnerabilities
tactics:
- Initial Access
- Execution
relevantTechniques: []
query: |
  //
  DeviceTvmSoftwareVulnerabilities 
  | where ingestion_time() > ago(7d)
  | summarize arg_max(DeviceId, *) by SoftwareVendor, SoftwareName
  | summarize DiscoveredOnDevicesCount = dcount(DeviceId) by SoftwareVendor, SoftwareName

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Device Inventory/Most Common Services.yaml