gundog: guided hunting for Microsoft 365 Defender
gundog – PowerShell based guided hunting in Microsoft 365 Defender
Gundog provides you with guided hunting in Microsoft 365 Defender. Especially (if not only) for Email and Endpoint Alerts at the moment.
You provide an AlertID (you might receive via Email notification) and gundog will then hunt for as much as possible associated data. It does not give you the flexibility of advanced hunting like you have in the portal, but it will give you a quick, first overview of the alert, all associated entities, and some enrichment.
All the hunting it does is based on the alert timestamp – so we only care about events shortly before, or after the alert.
It also provides you with PowerShell objects for each entity it hunted for – like $Network for everything it found related to this alert in the Microsoft 365 Defender DeviceNetworkEvents table.
gundog also comes up with some other features that make your life easier:
- per default, only the most relevant data is displayed (this is the way)
- it gives you context wherever possible: last AAD Sign-Ins & user’s AAD address
- network connections can be automatically filtered to display more relevant connections only (get rid of connections to Office 365 e.g.)
- network connections are enriched with geolocation (country & city)
- in the variables section, you can easily adjust most parameters like the advanced hunting timeframe of every query
- In addition, it searches for IOCs at other services like abuse.ch, urlscan.io, or ip-api.com. I ask you to apply for their paid services if you use them commercially.
After first evaluations with gundog, you can continue in the portal to dig deeper into the rabbit hole.