Edit

Share via


Work with advanced hunting query results

Important

Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.

While you can construct your advanced hunting queries to return precise information, you can also work with the query results to gain further insight and investigate specific activities and indicators. You can take the following actions on your query results:

View query results as a table or chart

By default, advanced hunting displays query results as tabular data. You can also display the same data as a chart. Advanced hunting supports the following views:

View type Description
Table Displays the query results in tabular format
Column chart Renders a series of unique items on the x-axis as vertical bars whose heights represent numeric values from another field
Pie chart Renders sectional pies representing unique items. The size of each pie represents numeric values from another field.
Line chart Plots numeric values for a series of unique items and connects the plotted values
Scatter chart Plots numeric values for a series of unique items
Area chart Plots numeric values for a series of unique items and fills the sections below the plotted values
Stacked area chart Plots numeric values for a series of unique items and stacks the filled sections below the plotted values
Time chart Plots values by count on a linear time scale

Important

You can view up to 100,000 advanced hunting query results in Microsoft Defender portal. Learn more about advanced hunting quotas and usage parameters.

Construct queries for effective charts

When rendering charts, advanced hunting automatically identifies columns of interest and the numeric values to aggregate. To get meaningful charts, construct your queries to return the specific values you want to see visualized. Here are some sample queries and the resulting charts.

Alerts by severity

Use the summarize operator to get a numeric count of the values you want to chart. The following query uses the summarize operator to count the number of alerts by severity.

AlertInfo
| summarize Total = count() by Severity

When rendering the results, a column chart displays each severity value as a separate column:

AlertInfo
| summarize Total = count() by Severity
| render columnchart

An example of a chart that displays advanced hunting results in the Microsoft Defender portal

Phishing emails across top ten sender domains

If you're dealing with a list of values that isn't finite, use the Top operator to chart only the values with the most instances. For example, to get the top 10 sender domains with the most phishing emails, use the following query:

EmailEvents
| where ThreatTypes has "Phish"
| summarize Count = count() by SenderFromDomain
| top 10 by Count

Use the pie chart view to effectively show distribution across the top domains:

The pie chart that displays advanced hunting results in the Microsoft Defender portal

File activities over time

By using the summarize operator with the bin() function, you can check for events involving a particular indicator over time. The following query counts events involving the file invoice.doc at 30-minute intervals to show spikes in activity related to that file:

CloudAppEvents
| union DeviceFileEvents
| where FileName == "invoice.doc"
| summarize FileCount = count() by bin(Timestamp, 30m)

The following line chart clearly highlights time periods with more activity involving invoice.doc:

The line chart that displays advanced hunting results in the Microsoft Defender portal

Export tables and charts

After running a query, select Export to save the results to a local file. Your chosen view determines how the results are exported:

  • Table view—The query results are exported in tabular form as a Microsoft Excel workbook.
  • Any chart—The query results are exported as a JPEG image of the rendered chart.

Filter results

After running a query, select Filter to narrow down the results.

Screenshot of filters in advanced hunting.

To add a filter, select the data you want to filter for by selecting one or more of the check boxes. Then select Add.

Screenshot of filters dropdown in advanced hunting.

You can narrow the results down even further to specific data by selecting the newly added filter.

Screenshot of new filter pill in advanced hunting.

This selection opens a dropdown showing the possible filters you can use. Select one or more of the check boxes, and then select Apply.

Screenshot of new filter's dropdown in advanced hunting.

Confirm that you added the filters you want by checking the Filters section.

Screenshot of filters added advanced hunting.

Drill down from query results

You can explore the results in-line by using the following features:

  • Expand a result by selecting the dropdown arrow at the left of each result.
  • Where applicable, expand details for results that are in JSON and array formats by selecting the dropdown arrow at the left of applicable column names for added readability.
  • Open the side pane to see a record's details (concurrent with expanded rows).

Screenshot of expanding results to drill down

You can also right-click on any result value in a row so that you can use it to add more filters to the existing query or copy the value for use in further investigation.

Screenshot of options upon right-clicking an option

For JSON and array fields, you can right-click and update the existing query to include or exclude the field, or to extend the field to a new column.

Screenshot of options upon right-clicking an option for JSON and array fields

To quickly inspect a record in your query results, select the corresponding row to open the Inspect record panel. The panel provides the following information based on the selected record:

  • Assets—Summarized view of the main assets (mailboxes, devices, and users) found in the record, enriched with available information, such as risk and exposure levels.
  • All details—All the values from the columns in the record.

The selected record with panel for inspecting the record in the Microsoft Defender portal

To view more information about a specific entity in your query results, such as a machine, file, user, IP address, or URL, select the entity identifier to open a detailed profile page for that entity.

Tweak your queries from the results

Select the three dots to the right of any column in the Inspect record panel. Use the options to:

  • Explicitly look for the selected value (==)
  • Exclude the selected value from the query (!=)
  • Get more advanced operators for adding the value to your query, such as contains, starts with, and ends with

Screenshot of the Action Type pane on the Inspect record page in the Microsoft Defender portal.

View query execution details and troubleshoot errors

View a query's execution details to understand why the query behaved the way it did, whether it succeeds or fails. This feature provides more visibility into query execution and helps you troubleshoot any problems more efficiently.

After running a query, select Query Details above the query results to open a side panel:

Screenshot of the advanced hunting page in the Defender portal with Query Details button highlighted.

In the Query Details side panel, select the Overview, Raw Statistics, and Errors tabs to explore your query's execution time breakdown, data source and scope, resource utilization, and other details:

Screenshot of the Query Details side panel.

If your query fails, select View full query details at the bottom of the error message to open the Query Details side panel. The error message might also provide an explanation why the query failed and actionable suggestions to fix it.

Screenshot of advanced hunting page in the Defender portal with View full query details button highlighted on an error message.

Add items to Favorites

Add your frequently used schemas, functions, queries, and detection rules to the Favorites section of each tab in the advanced hunting page for quick access.

Screenshot of the advanced hunting page with the Favorites section highlighted.

For example, to add AlertInfo to your Favorites, go to the Schema tab, select the three dots to the right of the table, and select Add to favorites.

Screenshot of the Add to Favorites option in the advanced hunting page.

A notification appears to inform you that the item was successfully added to Favorites.

Screenshot of notification that a new item was added to Favorites in advanced hunting.

You can do the same for your saved functions, queries, and custom detections in their respective Favorites sections right under each tab (Functions, Queries, and Detection Rules).

Note

Some tables in this article might not be available at Microsoft Defender for Endpoint. Turn on Microsoft Defender XDR to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in Migrate advanced hunting queries from Microsoft Defender for Endpoint.

Automatic timeline rendering

By default, a timeline appears above the advanced hunting results that displays event counts over time. The timeline automatically renders based on the Timestamp or timeGenerated column in the query results. It automatically updates when you apply filters and can help you quickly identify abnormal behavior and trends and focus on interesting results.

Screenshot of the timeline above the query results in advanced hunting.

You can select whether to display the timeline by default in the Chart preferences settings.

Screenshot of the Page preferences settings in advanced hunting.

The timeline automatically adjusts its resolution based on the range of results.

Filter the timeline results

Select any point on the timeline to filter both the results and the timeline to that specific time range. The timeline also updates its scale to match the selected time period. When you filter by a specific range, it zooms in to show event distribution in high resolution.

The following screenshot shows the results of a query that returns 1,000 email events. The timeline is unfiltered, so it displays the full range of results with a timestamp for each day. Select a day or range of days to filter the results for that time period.

Screenshot of an advanced hunting query of 1,000 email events with all the results unfiltered.

Split the timeline by values

You can split the results in the timeline by any column that has at least two but fewer than 50 unique values.

The following screenshot shows the results of a query that returns 1,000 email events. The timeline is ungrouped, so it displays all the results in a single line.

Screenshot of an advanced hunting query of 1,000 email events with the results all together in one line.

Change chart type

You can change the chart type of the timeline by selecting a different option from the chart type dropdown menu. The available chart types include:

  • Line chart
  • Column chart
  • Pie chart

Screenshot of an advanced hunting query of 1,000 email events with the results displayed in a column chart.

Rendering conditions

The timeline appears only if your results meet the following conditions:

  • Your results include more than 40 events.
  • Your results include a Timestamp or timeGenerated column.

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.