<ul data-eligibleForWebStory="true">A new feature in Microsoft Sentinel translates a Linux-based Sigma rule targeting the sysinfo system call into KQL for better detection.The sysinfo system call provides attackers with system metadata crucial for reconnaissance activities.The feature converts the Sigma rule's Linux auditd telemetry targeting sysinfo into KQL, excluding benign admin processes like splunkd.It uses sophisticated logic to filter syslog messages for sysinfo events and excludes known non-malicious activities like Splunk agent usage.This innovation streamlines cross-platform detection, translating auditd rules to Sentinel-compatible queries automatically.Uncoder AI facilitates the translation process by parsing Sigma logic, mapping to syslog fields, and preserving essential filters.The automation reduces the time and effort required for manual translation of detection rules from Sigma to Microsoft Sentinel.Security teams benefit from enhanced threat coverage across hybrid cloud and Linux environments without the need for manual KQL scripting.The feature aids in tactical reconnaissance detection, offering cleaner signals and better detection capabilities against early-stage attacks.By operationalizing Linux audit rules in Microsoft Sentinel, Uncoder AI enables faster and more effective threat detection.