← Back to SOC feed Coverage →

VulnComputers

kql MEDIUM Azure-Sentinel
IdentityQueryEvents
backdoorhuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-09T23:00:01Z · Confidence: medium

Hunt Hypothesis

Adversaries may use LDAP queries to identify vulnerable operating systems in Active Directory, which could indicate reconnaissance for targeted exploitation. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect early signs of potential lateral movement or privilege escalation attempts.

KQL Query

let ComputerObject = "objectCategory=computer";
let ComputerClass = "objectClass=computer";
let SamAccountComputer = "sAMAccountType=805306369";
let OperatingSystem = "operatingSystem=";
IdentityQueryEvents
| where ActionType == "LDAP query"
| parse Query with * "Search Scope: " SearchScope ", Base Object:" BaseObject ", Search Filter: " SearchFilter
| where (SearchFilter contains ComputerObject or SearchFilter contains ComputerClass or SearchFilter contains SamAccountComputer) and
 SearchFilter contains OperatingSystem

Analytic Rule Definition

id: ab8b5893-0c82-4a8c-ae19-43669b3d1eba
name: VulnComputers
description: |
  Detect Active Directory LDAP queries that try to find operating systems that are vulnerable to specific vulnerabilities
  This LDAP query cover MetaSploit - enum_ad_computers tool
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - IdentityQueryEvents
query: |
  let ComputerObject = "objectCategory=computer";
  let ComputerClass = "objectClass=computer";
  let SamAccountComputer = "sAMAccountType=805306369";
  let OperatingSystem = "operatingSystem=";
  IdentityQueryEvents
  | where ActionType == "LDAP query"
  | parse Query with * "Search Scope: " SearchScope ", Base Object:" BaseObject ", Search Filter: " SearchFilter
  | where (SearchFilter contains ComputerObject or SearchFilter contains ComputerClass or SearchFilter contains SamAccountComputer) and
   SearchFilter contains OperatingSystem

Required Data Sources

Sentinel TableNotes
IdentityQueryEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Discovery/VulnComputers.yaml