← Back to SOC feed Coverage →

Top 10 external senders sending Teams messages

kql MEDIUM Azure-Sentinel
T1562
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-12T23:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use external senders to exfiltrate data or establish command and control via Teams messages, leveraging T1562 techniques to communicate covertly. SOC teams should proactively hunt for this behavior to identify potential data exfiltration or C2 channels within their Azure Sentinel environment.

KQL Query

//Top 10 external senders sending Teams messages
MessageEvents 
| where IsOwnedThread==0 and IsExternalThread==1
| summarize count() by SenderEmailAddress
| sort by count_ desc
| top 10 by count_

Analytic Rule Definition

id: f143639b-24d5-4089-af92-be8eeea02822
name:  Top 10 external senders sending Teams messages
description: |
  This query visulises all up Top 10 external senders sending Teams messages
description-detailed: |
  This query visulises all up Top 10 external senders sending Teams messages
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - MessageEvents
tactics:
  - DefenseEvasion
relevantTechniques:
  - T1562
query: |
  //Top 10 external senders sending Teams messages
  MessageEvents 
  | where IsOwnedThread==0 and IsExternalThread==1
  | summarize count() by SenderEmailAddress
  | sort by count_ desc
  | top 10 by count_
version: 1.0.0

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Microsoft Teams protection/Top 10 external senders sending Teams messages.yaml