The Dashboard Was Green
No high-severity incident.
No ransomware banner. No critical Defender alert. No urgent Sentinel case waiting in the queue.
The dashboard looked healthy.
But the telemetry told a different story.
A sign-in happened outside the usual pattern. A mailbox event did not quite fit. A PowerShell command ran without creating a major alert. A SharePoint download occurred at a strange time. An email authentication result looked weak, but the message was still delivered.
This Agent Foskett briefing looks at one of the most important lessons in Microsoft security operations: do not just wait for alerts — ask the data better questions.
Briefing summary
Microsoft Defender XDR is powerful, but dashboards and automated alerts are not the whole investigation. GEMXIT looks at how KQL, identity telemetry, email signals, endpoint events and behavioural patterns help reveal what dashboards can miss.
What happened
The problem with alert-only security
First hunt: unusual successful sign-ins
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
SigninLogs | where TimeGenerated > ago(7d) | where ResultType == 0 | summarize SignInCount = count(), Apps = make_set(AppDisplayName), IPs = make_set(IPAddress), Locations = make_set(Location), Clients = make_set(ClientAppUsed) by UserPrincipalName, bin(TimeGenerated, 1d) | order by SignInCount desc
Second hunt: suspicious email signals without panic
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
EmailEvents | where Timestamp > ago(7d) | where AuthenticationDetails has_any ("dmarc=fail", "spf=fail", "dkim=fail") or ThreatTypes has_any ("Phish", "Spoof") | project Timestamp, SenderFromAddress, RecipientEmailAddress, Subject, DeliveryAction, AuthenticationDetails, ThreatTypes | order by Timestamp desc
Third hunt: endpoint behaviour that did not become a major alert
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
DeviceProcessEvents | where Timestamp > ago(7d) | where FileName in~ ("powershell.exe", "pwsh.exe", "cmd.exe", "wscript.exe", "mshta.exe", "rundll32.exe") | project Timestamp, DeviceName, InitiatingProcessAccountName, FileName, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine | order by Timestamp desc
The questions good investigators ask
How GEMXIT approaches Defender investigations
Final thought
It is: “What does the telemetry reveal when we investigate properly?”
Continue the investigation with Cyber Security Is Not Just Antivirus, When Nothing Looks Wrong, The PowerShell Never Triggered An Alert, KQL Threat Hunting Guide, Microsoft Defender KQL Guide and Microsoft Security Operations.
Develop IT. Protect IT. GEMXIT PTY LTD | GEMXIT UK LTD