← Back to SOC feed Coverage →

Teams Admin submission of Malware and Phish daily trend

kql MEDIUM Azure-Sentinel
T1562
CloudAppEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-12T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may be exploiting Teams Admin submission capabilities to bypass detection by submitting malicious or phishing content as false negatives. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential evasion tactics and improve detection accuracy.

KQL Query

//Admin submission of false negative Teams message detections with Malware and Phish threat daily trend
let TimeStart = startofday(ago(30d));
let TimeEnd = startofday(now());
let baseQuery=CloudAppEvents
| extend SubmissionType = tostring((parse_json(RawEventData)).SubmissionType),SubmissionContentType=tostring((parse_json(RawEventData)).SubmissionContentType)
| where ActionType == "AdminSubmissionSubmitted" and SubmissionContentType == "ChatMessage";
let Admin_Malware_FN=baseQuery
| make-series Count= countif(SubmissionType == "2") default = 0 on Timestamp from TimeStart to TimeEnd step 1d
| extend Details = "Admin_Malware_FN";
let Admin_Phish_FN=baseQuery
| make-series Count= countif(SubmissionType == "1") default = 0 on Timestamp from TimeStart to TimeEnd step 1d
| extend Details = "Admin_Phish_FN";
union Admin_Malware_FN,Admin_Phish_FN
| project Count, Details, Timestamp
| render timechart

Analytic Rule Definition

id: 13db68a8-bce1-4929-b8db-2589ee552e75
name:  Teams Admin submission of Malware and Phish daily trend
description: |
  This query visualises the daily amount of admin false negative Teams message submissions by submission type of Phish or Malware 
description-detailed: |
  This query visualises the daily amount of admin false negative Teams message submissions by submission type of Phish or Malware 
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - CloudAppEvents
tactics:
  - DefenseEvasion
relevantTechniques:
  - T1562
query: |
 //Admin submission of false negative Teams message detections with Malware and Phish threat daily trend
 let TimeStart = startofday(ago(30d));
 let TimeEnd = startofday(now());
 let baseQuery=CloudAppEvents
 | extend SubmissionType = tostring((parse_json(RawEventData)).SubmissionType),SubmissionContentType=tostring((parse_json(RawEventData)).SubmissionContentType)
 | where ActionType == "AdminSubmissionSubmitted" and SubmissionContentType == "ChatMessage";
 let Admin_Malware_FN=baseQuery
 | make-series Count= countif(SubmissionType == "2") default = 0 on Timestamp from TimeStart to TimeEnd step 1d
 | extend Details = "Admin_Malware_FN";
 let Admin_Phish_FN=baseQuery
 | make-series Count= countif(SubmissionType == "1") default = 0 on Timestamp from TimeStart to TimeEnd step 1d
 | extend Details = "Admin_Phish_FN";
 union Admin_Malware_FN,Admin_Phish_FN
 | project Count, Details, Timestamp
 | render timechart
version: 1.0.0

Required Data Sources

Sentinel TableNotes
CloudAppEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Microsoft Teams protection/Teams Admin submission of Malware and Phish daily trend.yaml