← Back to SOC feed Coverage →

User not covered under display name impersonation

kql MEDIUM Azure-Sentinel
T1566
EmailEventsIdentityInfo
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-18T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may impersonate users not covered by display name protection to gain unauthorized access or manipulate systems. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential impersonation attacks before they lead to data exfiltration or lateral movement.

KQL Query

let display_names = 
IdentityInfo 
  | summarize by AccountDisplayName 
  | project-rename  SenderDisplayName = AccountDisplayName; 
EmailEvents 
  | where EmailDirection == "Inbound" 
  | where ThreatNames != "" 
  | where ThreatNames !contains "Impersonation User" 
  | lookup kind=inner (display_names) on SenderDisplayName, $left.SenderDisplayName == $right.SenderDisplayName 
  | where SenderDisplayName != "" 
  | summarize by SenderDisplayName

Analytic Rule Definition

id: e90345b3-439c-44e1-a85d-8ae84ad9c65b
name: User not covered under display name impersonation
description: |
  This query helps to find threats using display name impersonation for users not already protected with User Impersonation
description-detailed: |
  This query helps to find threats using display name impersonation for users not already protected with User Impersonation
requiredDataConnectors:
  - connectorId: MicrosoftThreatProtection
    dataTypes:
      - EmailEvents
      - IdentityInfo
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  let display_names = 
  IdentityInfo 
    | summarize by AccountDisplayName 
    | project-rename  SenderDisplayName = AccountDisplayName; 
  EmailEvents 
    | where EmailDirection == "Inbound" 
    | where ThreatNames != "" 
    | where ThreatNames !contains "Impersonation User" 
    | lookup kind=inner (display_names) on SenderDisplayName, $left.SenderDisplayName == $right.SenderDisplayName 
    | where SenderDisplayName != "" 
    | summarize by SenderDisplayName
version: 1.0.0 

Required Data Sources

Sentinel TableNotes
EmailEventsEnsure this data connector is enabled
IdentityInfoEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Spoof and Impersonation/User not covered under display name impersonation.yaml