← Back to SOC feed Coverage →

URL click on URLs in ZAP-d Teams messages

kql MEDIUM Azure-Sentinel
T1566
UrlClickEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-12T23:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may be using ZAP-d Teams messages to deliver malicious URLs that, when clicked, could lead to command and control communication or data exfiltration. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential phishing or credential theft attempts leveraging compromised Teams communication channels.

KQL Query

//URL click on URLs in ZAP-d Teams messages
MessagePostDeliveryEvents
| join MessageUrlInfo on TeamsMessageId
| join UrlClickEvents on Url
| where ActionType !=""

Analytic Rule Definition

id: 4741e46e-1bdd-453a-90a8-13302a352a73
name: URL click on URLs in ZAP-d Teams messages
description: |
  This query visualizes URL clicks on URLs in Teams messages which were acted by ZAP.
description-detailed: |
  This query visualizes URL clicks on URLs in Teams messages which were acted by ZAP.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - UrlClickEvents
  - MessagePostDeliveryEvents
  - MessageUrlInfo
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  //URL click on URLs in ZAP-d Teams messages
  MessagePostDeliveryEvents
  | join MessageUrlInfo on TeamsMessageId
  | join UrlClickEvents on Url
  | where ActionType !=""
version: 1.0.0

Required Data Sources

Sentinel TableNotes
UrlClickEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Microsoft Teams protection/URL click on URLs in ZAP-d Teams messages.yaml