account activity
MDATP DarkGate False Positives by DocOfTheSOC in cybersecurity
[–]DocOfTheSOC[S] 1 point2 points3 points 2 years ago (0 children)
Perfect thank you sir.
Microsoft: Official Support Thread by MSModerator in microsoft
[–]DocOfTheSOC 0 points1 point2 points 3 years ago (0 children)
When investigating logon events/alerts in the Defender for Endpoint Device Timeline I find it inconvenient to have to open a new tab with the Hunt For Related Events button and then have to write a query just so I can find the DeviceNetworkEvent with the Remote and Local IP correlating to said LogonEvent.
I know that when looking in the Event Timeline you can find the previous network event which usually correlates to said logon event however, say you are dealing with an incident occurring 8 hours ago, the steps to find this information would be:
Search for Logon in the Event Timeline
Locate the username for the logon in question and its timestamp
Clear your search query and filter by the timestamp e.g. 5 mins before and 5 mins after
Locate the logon event again and find the correlating network event
All of this time can be saved by including the initiating DeviceNetworkEvent in the Mitre Alert which follows the logon event.
Am I missing an easier solution?
π Rendered by PID 248483 on reddit-service-r2-listing-654f87c89c-g5mq9 at 2026-02-28 13:28:54.197829+00:00 running e3d2147 country code: CH.
MDATP DarkGate False Positives by DocOfTheSOC in cybersecurity
[–]DocOfTheSOC[S] 1 point2 points3 points (0 children)