Documentation Index
Fetch the complete documentation index at: https://blog.daehyung.dev/llms.txt
Use this file to discover all available pages before exploring further.
Phishing Detection with Sentinel
Hunt inbound phishing in Microsoft Sentinel using a simple mail log table and KQL.1. Data
We have a table that has direction, sender, recipient, subject, attachment, and message content.2. Hunt for unknown email sender
- Open Microsoft Sentinel.
- Go to Logs.
- Run this query to list inbound email from outside the organization domain.


3. Targeted filter
Use this when you have a known phishing subject and you want exact matches fast.
4. Attachment triage
This is the first pivot when a user reports a suspicious attachment.
5. Turn hunt into a scheduled rule
So we can detect the phishing email periodically- Go to Analytics.
- Create a Scheduled query rule.
- Use the Attachment triage query as the starting point.
- Set query frequency to 5 minutes.
- Map entities for sender and recipient if the schema supports it.
- Create incidents so triage starts in the Incidents queue.