Skip to main content

Platform Query Variants

This page tracks platform-specific query status. The goal is to separate portable detection logic from backend-specific deployment artifacts.

Current Status

DetectionSentinel / Defender XDRSplunkElasticStatus
DET-001 Intune Bulk Device Wipe AnomalyKQL exists: detections/kql/intune-bulk-device-wipe-anomaly.kqlNot committedNot committedHunt
DET-002 Suspicious RMM Installer Download From User ContextKQL exists: detections/kql/suspicious-rmm-file-sharing-download.kqlConverted output exists in detections/splunk/sigma-converted-splunk.splConverted output exists in detections/elastic/sigma-converted-lucene.txtPilot
DET-003 Unitronics PLC HMI Web Interface AccessSigma source existsConverted output exists in detections/splunk/sigma-converted-splunk.splConverted output exists in detections/elastic/sigma-converted-lucene.txtHunt
DET-004 Mail Click To Execution CorrelationKQL exists: detections/kql/mail-click-to-exec-correlation.kqlNot committedNot committedHunt

Validation Standard

A platform variant is considered validated only when all of the following are committed:

  • backend-specific query;
  • source rule or analytic ID;
  • field mapping;
  • positive test output;
  • negative test output;
  • historical or representative benign replay;
  • measured alert volume or false-positive rate;
  • SOC triage and rollback procedure.

The current KQL and Sigma artifacts are suitable for hunt planning and pilot design. They are not production variants.