← Back to SOC feed Coverage →

SolarWinds -CVE-2021-35211

kql MEDIUM Azure-Sentinel
DeviceNetworkEvents
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-21T23:00:01Z · Confidence: medium

Hunt Hypothesis

Adversaries may establish unauthorized network connections to SolarWinds IP addresses to exfiltrate data or move laterally within the network. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential compromise from supply chain attacks leveraging CVE-2021-35211.

KQL Query

let IPs = pack_array("98.176.196.89", "68.235.178.32", 
"208.113.35.58","144.34.179.162","97.77.97.58"); 
DeviceNetworkEvents
| where RemotePort == 443
| where Protocol == "Tcp" and ActionType == "ConnectionSuccess"
| where Timestamp > ago(7d) 
| where RemoteIP in(IPs)

Analytic Rule Definition

id: ff01fb94-9b27-48b9-a304-2e86108b5ca4
name: SolarWinds -CVE-2021-35211
description: |
  //Check for network connections with SolarWInds IP's based on DeviceNetworkEvents## Query
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceNetworkEvents
tactics:
- Command and control
query: |
  let IPs = pack_array("98.176.196.89", "68.235.178.32", 
  "208.113.35.58","144.34.179.162","97.77.97.58"); 
  DeviceNetworkEvents
  | where RemotePort == 443
  | where Protocol == "Tcp" and ActionType == "ConnectionSuccess"
  | where Timestamp > ago(7d) 
  | where RemoteIP in(IPs)

Required Data Sources

Sentinel TableNotes
DeviceNetworkEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Exploits/SolarWinds -CVE-2021-35211.yaml