← Back to SOC feed Coverage →

Zero day threats

kql MEDIUM Azure-Sentinel
T1566
EmailEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-11T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may leverage zero-day vulnerabilities by executing malicious URLs or files that bypass existing detection mechanisms. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential zero-day attacks before they cause widespread damage.

KQL Query

EmailEvents 
| where Timestamp > ago(30d) 
| where DetectionMethods has "URL Detonation" or DetectionMethods has "File Detonation" 
| count

Analytic Rule Definition

id: 95b0c7ed-2853-4343-80a9-ab076cf31e51
name: Zero day threats
description: |
  This query helps reviewing zero day threats via URL and file detonations
description-detailed: |
  This query helps reviewing zero day threats via URL and file detonations using Defender for Office 365 data
requiredDataConnectors:
  - connectorId: MicrosoftThreatProtection
    dataTypes:
      - EmailEvents
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  EmailEvents 
  | where Timestamp > ago(30d) 
  | where DetectionMethods has "URL Detonation" or DetectionMethods has "File Detonation" 
  | count
version: 1.0.0

Required Data Sources

Sentinel TableNotes
EmailEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Mailflow/Zero day threats.yaml