← Back to SOC feed Coverage →

Top malicious URLs clicked by users in Teams

kql MEDIUM Azure-Sentinel
T1566
UrlClickEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-12T23:00:00Z · Confidence: medium

Hunt Hypothesis

Users clicking on top malicious URLs in Teams may indicate phishing or credential compromise attempts, as adversaries often use compromised or deceptive links to exfiltrate data or install malware. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential breaches early.

KQL Query

//This query shows the top 20 URL's that have a detection associated with it and the most ammount of clicks registered from Microsoft Teams 
UrlClickEvents
| where ThreatTypes !="" and Workload =="Teams"
| summarize count() by Url, ThreatTypes, ActionType, Workload
| project Url, ThreatTypes, ActionType, Workload, ClickCount=count_
| top 20 by ClickCount

Analytic Rule Definition

id: 1676c486-4f27-4c88-b36f-6110a182d6de
name: Top malicious URLs clicked by users in Teams
description: |
  This query helps hunt for top malicious URLs clicked by users in Teams  
description-detailed: |
  This query helps hunt for top malicious URLs clicked by users in Teams using Microsoft Defender for Office 365 and Advance hunting in Microsoft Defender XDR
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - UrlClickEvents
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  //This query shows the top 20 URL's that have a detection associated with it and the most ammount of clicks registered from Microsoft Teams 
  UrlClickEvents
  | where ThreatTypes !="" and Workload =="Teams"
  | summarize count() by Url, ThreatTypes, ActionType, Workload
  | project Url, ThreatTypes, ActionType, Workload, ClickCount=count_
  | top 20 by ClickCount
version: 1.0.0

Required Data Sources

Sentinel TableNotes
UrlClickEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Microsoft Teams protection/Top malicious URLs clicked by users in Teams.yaml