Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
375 commits
Select commit Hold shift + click to select a range
2448581
Exported file: Dev-0228 File Path Hashes November 2021 - ASIM.json.json
azure-sentinel-canary[bot] Feb 24, 2023
56f7af8
Exported file: Dev-0228 File Path Hashes November 2021.json.json
azure-sentinel-canary[bot] Feb 24, 2023
8d8f8bb
Exported file: Distributed Password cracking attempts in AzureAD.json…
azure-sentinel-canary[bot] Feb 24, 2023
82318b9
Exported file: Duplicate Rule DisplayName 1 (1).json.json
azure-sentinel-canary[bot] Feb 24, 2023
78f264f
Exported file: Duplicate Rule DisplayName 1.json.json
azure-sentinel-canary[bot] Feb 24, 2023
9958047
Exported file: Email access via active sync.json.json
azure-sentinel-canary[bot] Feb 24, 2023
e33eca4
Exported file: Excessive Amount of Denied Connections from a Single S…
azure-sentinel-canary[bot] Feb 24, 2023
bcd1303
Exported file: Excessive Denied Proxy Traffic.json.json
azure-sentinel-canary[bot] Feb 24, 2023
9ede168
Exported file: Excessive Failed Authentication from Invalid Inputs.js…
azure-sentinel-canary[bot] Feb 24, 2023
3275cad
Exported file: Excessive NXDOMAIN DNS Queries (Normalized DNS).json.json
azure-sentinel-canary[bot] Feb 24, 2023
5818507
Exported file: Excessive NXDOMAIN DNS Queries.json.json
azure-sentinel-canary[bot] Feb 24, 2023
98ebd5e
Exported file: Excessive Windows logon failures.json.json
azure-sentinel-canary[bot] Feb 24, 2023
d8735ba
Exported file: Excessive number of failed connections from a single s…
azure-sentinel-canary[bot] Feb 24, 2023
50b5abd
Exported file: Exchange AuditLog disabled.json.json
azure-sentinel-canary[bot] Feb 24, 2023
88db76c
Exported file: Exchange OAB Virtual Directory Attribute Containing Po…
azure-sentinel-canary[bot] Feb 24, 2023
34477e5
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection (1).…
azure-sentinel-canary[bot] Feb 24, 2023
b82a0d4
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection.json…
azure-sentinel-canary[bot] Feb 24, 2023
df285bf
Exported file: Exchange Server Vulnerabilities Disclosed March 2021 I…
azure-sentinel-canary[bot] Feb 24, 2023
892bf07
Exported file: Exchange workflow MailItemsAccessed operation anomaly.…
azure-sentinel-canary[bot] Feb 24, 2023
122020a
Exported file: Explicit MFA Deny.json.json
azure-sentinel-canary[bot] Feb 24, 2023
c6f1b3c
Exported file: External Upstream Source Added to Azure DevOps Feed.js…
azure-sentinel-canary[bot] Feb 24, 2023
e2cb30a
Exported file: External User Access Enabled.json.json
azure-sentinel-canary[bot] Feb 24, 2023
4c07441
Exported file: External guest invitations by default guest followed b…
azure-sentinel-canary[bot] Feb 24, 2023
d6471fc
Exported file: External user added and removed in short timeframe.jso…
azure-sentinel-canary[bot] Feb 24, 2023
d2c3530
Exported file: Failed AWS Console logons but success logon to AzureAD…
azure-sentinel-canary[bot] Feb 24, 2023
8064a8e
Exported file: Failed AzureAD logons but success logon to AWS Console…
azure-sentinel-canary[bot] Feb 24, 2023
7c32dc1
Exported file: Failed AzureAD logons but success logon to host.json.json
azure-sentinel-canary[bot] Feb 24, 2023
0dc5ed4
Exported file: Failed Logins from Unknown or Invalid User.json.json
azure-sentinel-canary[bot] Feb 24, 2023
cc69e00
Exported file: Failed host logons but success logon to AzureAD.json.json
azure-sentinel-canary[bot] Feb 24, 2023
9b5c986
Exported file: Failed login attempts to Azure Portal.json.json
azure-sentinel-canary[bot] Feb 24, 2023
033cd82
Exported file: Failed logon attempts by valid accounts within 10 mins…
azure-sentinel-canary[bot] Feb 24, 2023
95c544a
Exported file: Failed logon attempts in authpriv.json.json
azure-sentinel-canary[bot] Feb 24, 2023
6b722f0
Exported file: First access credential added to Application or Servic…
azure-sentinel-canary[bot] Feb 24, 2023
f79a2f5
Exported file: Fortinet - Beacon pattern detected.json.json
azure-sentinel-canary[bot] Feb 24, 2023
821d47e
Exported file: Full Admin policy created and then attached to Roles, …
azure-sentinel-canary[bot] Feb 24, 2023
074262e
Exported file: Gain Code Execution on ADFS Server via Remote WMI Exec…
azure-sentinel-canary[bot] Feb 24, 2023
d8b147a
Exported file: Gain Code Execution on ADFS Server via SMB + Remote Se…
azure-sentinel-canary[bot] Feb 24, 2023
4851f6f
Exported file: GitHub Activites from a New Country.json.json
azure-sentinel-canary[bot] Feb 24, 2023
37d07dc
Exported file: GitHub Security Vulnerability in Repository.json.json
azure-sentinel-canary[bot] Feb 24, 2023
8c41249
Exported file: GitHub Signin Burst from Multiple Locations.json.json
azure-sentinel-canary[bot] Feb 24, 2023
db7e839
Exported file: GitHub Two Factor Auth Disable.json.json
azure-sentinel-canary[bot] Feb 24, 2023
0e67ba9
Exported file: Group created then added to built in domain local or g…
azure-sentinel-canary[bot] Feb 24, 2023
ebcb4c0
Exported file: HAFNIUM New UM Service Child Process.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a40ce15
Exported file: HAFNIUM Suspicious Exchange Request.json.json
azure-sentinel-canary[bot] Feb 24, 2023
07d5823
Exported file: HAFNIUM Suspicious File Downloads_.json.json
azure-sentinel-canary[bot] Feb 24, 2023
70d5f60
Exported file: HAFNIUM Suspicious UM Service Error.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a27c493
Exported file: HAFNIUM UM Service writing suspicious file.json.json
azure-sentinel-canary[bot] Feb 24, 2023
4fed465
Exported file: High Number of Urgent Vulnerabilities Detected (1).jso…
azure-sentinel-canary[bot] Feb 24, 2023
061b210
Exported file: High Number of Urgent Vulnerabilities Detected.json.json
azure-sentinel-canary[bot] Feb 24, 2023
df46844
Exported file: High Urgency Cyberpion Action Items.json.json
azure-sentinel-canary[bot] Feb 24, 2023
998fb1e
Exported file: High count of connections by client IP on many ports.j…
azure-sentinel-canary[bot] Feb 24, 2023
52f7618
Exported file: High count of failed attempts from same client IP.json…
azure-sentinel-canary[bot] Feb 24, 2023
b511d2a
Exported file: High count of failed logons by a user.json.json
azure-sentinel-canary[bot] Feb 24, 2023
c7d8607
Exported file: IP with multiple failed Azure AD logins successfully l…
azure-sentinel-canary[bot] Feb 24, 2023
1574186
Exported file: Known Barium IP.json.json
azure-sentinel-canary[bot] Feb 24, 2023
1e2f3b0
Exported file: Known Barium domains.json.json
azure-sentinel-canary[bot] Feb 24, 2023
cbf1ad2
Exported file: Known CERIUM domains and hashes.json.json
azure-sentinel-canary[bot] Feb 24, 2023
89fa9e1
Exported file: Known GALLIUM domains and hashes.json.json
azure-sentinel-canary[bot] Feb 24, 2023
d0e35ed
Exported file: Known IRIDIUM IP.json.json
azure-sentinel-canary[bot] Feb 24, 2023
5cc24c2
Exported file: Known Malware Detected.json.json
azure-sentinel-canary[bot] Feb 24, 2023
c7a7b63
Exported file: Known Manganese IP and UserAgent activity.json.json
azure-sentinel-canary[bot] Feb 24, 2023
9007d7d
Exported file: Known NICKEL domains and hashes.json.json
azure-sentinel-canary[bot] Feb 24, 2023
3b34489
Exported file: Known PHOSPHORUS group domains_IP - October 2020.json.…
azure-sentinel-canary[bot] Feb 24, 2023
1202c61
Exported file: Known Phosphorus group domains_IP.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a7a089a
Exported file: Known STRONTIUM group domains - July 2019.json.json
azure-sentinel-canary[bot] Feb 24, 2023
7bd23ff
Exported file: Known ZINC Comebacker and Klackring malware hashes.jso…
azure-sentinel-canary[bot] Feb 24, 2023
cfb9684
Exported file: Known ZINC related maldoc hash.json.json
azure-sentinel-canary[bot] Feb 24, 2023
9ec8deb
Exported file: Linked Malicious Storage Artifacts.json.json
azure-sentinel-canary[bot] Feb 24, 2023
f9cf594
Exported file: Log4j vulnerability exploit aka Log4Shell IP IOC.json.…
azure-sentinel-canary[bot] Feb 24, 2023
5c031d6
Exported file: Login to AWS Management Console without MFA.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a8af80d
Exported file: MFA Rejected by User.json.json
azure-sentinel-canary[bot] Feb 24, 2023
87133ea
Exported file: MFA disabled for a user.json.json
azure-sentinel-canary[bot] Feb 24, 2023
3f39de5
Exported file: MSHTML vulnerability CVE-2021-40444 attack.json.json
azure-sentinel-canary[bot] Feb 24, 2023
70609ed
Exported file: Mail redirect via ExO transport rule.json.json
azure-sentinel-canary[bot] Feb 24, 2023
51a8998
Exported file: Mail.Read Permissions Granted to Application.json.json
azure-sentinel-canary[bot] Feb 24, 2023
0baa23e
Exported file: Malformed user agent.json.json
azure-sentinel-canary[bot] Feb 24, 2023
ae181a4
Exported file: Malicious Inbox Rule.json.json
azure-sentinel-canary[bot] Feb 24, 2023
59ae102
Exported file: Malicious web application requests linked with Microso…
azure-sentinel-canary[bot] Feb 24, 2023
05317ba
Exported file: Malware in the recycle bin (Normalized Process Events)…
azure-sentinel-canary[bot] Feb 24, 2023
b8fc930
Exported file: Malware in the recycle bin.json.json
azure-sentinel-canary[bot] Feb 24, 2023
033c44b
Exported file: Mass secret retrieval from Azure Key Vault.json.json
azure-sentinel-canary[bot] Feb 24, 2023
0454851
Exported file: Microsoft COVID-19 file hash indicator matches.json.json
azure-sentinel-canary[bot] Feb 24, 2023
d82b398
Exported file: Modified domain federation trust settings.json.json
azure-sentinel-canary[bot] Feb 24, 2023
04caee0
Exported file: Monitor AWS Credential abuse or hijacking.json.json
azure-sentinel-canary[bot] Feb 24, 2023
69de4fe
Exported file: Multiple Password Reset by user.json.json
azure-sentinel-canary[bot] Feb 24, 2023
b3d4b1a
Exported file: Multiple RDP connections from Single System.json.json
azure-sentinel-canary[bot] Feb 24, 2023
132e5f5
Exported file: Multiple Teams deleted by a single user.json.json
azure-sentinel-canary[bot] Feb 24, 2023
ff424ec
Exported file: Multiple users email forwarded to same destination.jso…
azure-sentinel-canary[bot] Feb 24, 2023
04c65a8
Exported file: NOBELIUM - Domain and IP IOCs - March 2021.json.json
azure-sentinel-canary[bot] Feb 24, 2023
22d0097
Exported file: NOBELIUM - Domain, Hash and IP IOCs - May 2021.json.json
azure-sentinel-canary[bot] Feb 24, 2023
835cbb9
Exported file: NOBELIUM - Script payload stored in Registry.json.json
azure-sentinel-canary[bot] Feb 24, 2023
f20d75b
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Feb 24, 2023
02e352b
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Feb 24, 2023
8dd846e
Exported file: NOBELIUM IOCs related to FoggyWeb backdoor.json.json
azure-sentinel-canary[bot] Feb 24, 2023
5e78dc4
Exported file: Network endpoint to host executable correlation.json.json
azure-sentinel-canary[bot] Feb 24, 2023
3bc66e3
Exported file: New Agent Added to Pool by New User or Added to a New …
azure-sentinel-canary[bot] Feb 24, 2023
463f567
Exported file: New CloudShell User.json.json
azure-sentinel-canary[bot] Feb 24, 2023
bb79664
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Feb 24, 2023
69ac8b5
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Feb 24, 2023
1a9a85b
Exported file: New PA, PCA, or PCAS added to Azure DevOps.json.json
azure-sentinel-canary[bot] Feb 24, 2023
5d8213b
Exported file: New UserAgent observed in last 24 hours.json.json
azure-sentinel-canary[bot] Feb 24, 2023
397d36b
Exported file: New access credential added to Application or Service …
azure-sentinel-canary[bot] Feb 24, 2023
e573019
Exported file: New executable via Office FileUploaded Operation.json.…
azure-sentinel-canary[bot] Feb 24, 2023
f483e29
Exported file: New internet-exposed SSH endpoints.json.json
azure-sentinel-canary[bot] Feb 24, 2023
1e931ab
Exported file: New user created and added to the built-in administrat…
azure-sentinel-canary[bot] Feb 24, 2023
accd8ef
Exported file: Non Domain Controller Active Directory Replication.jso…
azure-sentinel-canary[bot] Feb 24, 2023
6ffdfc4
Exported file: OMI Vulnerability Exploitation.json.json
azure-sentinel-canary[bot] Feb 24, 2023
d9549b3
Exported file: Office policy tampering.json.json
azure-sentinel-canary[bot] Feb 24, 2023
74d0c2e
Exported file: PIM Elevation Request Rejected.json.json
azure-sentinel-canary[bot] Feb 24, 2023
ccc915b
Exported file: Palo Alto - possible internal to external port scannin…
azure-sentinel-canary[bot] Feb 24, 2023
6555a58
Exported file: Palo Alto - potential beaconing detected.json.json
azure-sentinel-canary[bot] Feb 24, 2023
db9fce8
Exported file: Password spray attack against Azure AD application.jso…
azure-sentinel-canary[bot] Feb 24, 2023
e698485
Exported file: Port Scan Detected.json.json
azure-sentinel-canary[bot] Feb 24, 2023
ea10ff3
Exported file: Possible STRONTIUM attempted credential harvesting - O…
azure-sentinel-canary[bot] Feb 24, 2023
29b5361
Exported file: Possible STRONTIUM attempted credential harvesting - S…
azure-sentinel-canary[bot] Feb 24, 2023
a1b30cf
Exported file: Possible contact with a domain generated by a DGA.json…
azure-sentinel-canary[bot] Feb 24, 2023
352a936
Exported file: Potential Build Process Compromise - MDE.json.json
azure-sentinel-canary[bot] Feb 24, 2023
0e2ee4b
Exported file: Potential Build Process Compromise.json.json
azure-sentinel-canary[bot] Feb 24, 2023
9db12aa
Exported file: Potential DGA detected (ASimDNS).json.json
azure-sentinel-canary[bot] Feb 24, 2023
6bba47f
Exported file: Potential DGA detected.json.json
azure-sentinel-canary[bot] Feb 24, 2023
408f32c
Exported file: Potential DHCP Starvation Attack.json.json
azure-sentinel-canary[bot] Feb 24, 2023
70c14d6
Exported file: Potential Kerberoasting.json.json
azure-sentinel-canary[bot] Feb 24, 2023
dce9ca1
Exported file: Potential Password Spray Attack (Uses Authentication N…
azure-sentinel-canary[bot] Feb 24, 2023
a58b0a6
Exported file: Potential Password Spray Attack.json.json
azure-sentinel-canary[bot] Feb 24, 2023
995f8b7
Exported file: Powershell Empire cmdlets seen in command line.json.json
azure-sentinel-canary[bot] Feb 24, 2023
f2b3582
Exported file: Privileged Accounts - Sign in Failure Spikes.json.json
azure-sentinel-canary[bot] Feb 24, 2023
1123344
Exported file: Privileged Role Assigned Outside PIM.json.json
azure-sentinel-canary[bot] Feb 24, 2023
68bf808
Exported file: Probable AdFind Recon Tool Usage (Normalized Process E…
azure-sentinel-canary[bot] Feb 24, 2023
b87831a
Exported file: Probable AdFind Recon Tool Usage.json.json
azure-sentinel-canary[bot] Feb 24, 2023
cd56433
Exported file: Process executed from binary hidden in Base64 encoded …
azure-sentinel-canary[bot] Feb 24, 2023
da2ddb8
Exported file: Process execution frequency anomaly.json.json
azure-sentinel-canary[bot] Feb 24, 2023
67ece67
Exported file: ProofpointPOD - Binary file in attachment.json.json
azure-sentinel-canary[bot] Feb 24, 2023
aebc29a
Exported file: ProofpointPOD - Email sender IP in TI list.json.json
azure-sentinel-canary[bot] Feb 24, 2023
da018f8
Exported file: ProofpointPOD - Email sender in TI list.json.json
azure-sentinel-canary[bot] Feb 24, 2023
f331176
Exported file: ProofpointPOD - High risk message not discarded.json.json
azure-sentinel-canary[bot] Feb 24, 2023
3126622
Exported file: ProofpointPOD - Multiple archived attachments to the s…
azure-sentinel-canary[bot] Feb 24, 2023
f2eb7c5
Exported file: ProofpointPOD - Multiple large emails to the same reci…
azure-sentinel-canary[bot] Feb 24, 2023
31a96cb
Exported file: ProofpointPOD - Multiple protected emails to unknown r…
azure-sentinel-canary[bot] Feb 24, 2023
fb59194
Exported file: ProofpointPOD - Possible data exfiltration to private …
azure-sentinel-canary[bot] Feb 24, 2023
6f4d91e
Exported file: ProofpointPOD - Suspicious attachment.json.json
azure-sentinel-canary[bot] Feb 24, 2023
38b610e
Exported file: ProofpointPOD - Weak ciphers.json.json
azure-sentinel-canary[bot] Feb 24, 2023
3e809b6
Exported file: PulseConnectSecure - Large Number of Distinct Failed U…
azure-sentinel-canary[bot] Feb 24, 2023
cfb8e1c
Exported file: PulseConnectSecure - Potential Brute Force Attempts.js…
azure-sentinel-canary[bot] Feb 24, 2023
00a6e42
Exported file: RDP Nesting.json.json
azure-sentinel-canary[bot] Feb 24, 2023
f2a3c20
Exported file: Rare RDP Connections.json.json
azure-sentinel-canary[bot] Feb 24, 2023
ee12e63
Exported file: Rare and potentially high-risk Office operations.json.…
azure-sentinel-canary[bot] Feb 24, 2023
a067930
Exported file: Rare application consent.json.json
azure-sentinel-canary[bot] Feb 24, 2023
764c4e7
Exported file: Rare client observed with high reverse DNS lookup coun…
azure-sentinel-canary[bot] Feb 24, 2023
3e8a8a5
Exported file: Rare subscription-level operations in Azure.json.json
azure-sentinel-canary[bot] Feb 24, 2023
cccb056
Exported file: Request for single resource on domain.json.json
azure-sentinel-canary[bot] Feb 24, 2023
e419fc2
Exported file: SOURGUM Actor IOC - July 2021.json.json
azure-sentinel-canary[bot] Feb 24, 2023
931eba2
Exported file: SSH - Potential Brute Force.json.json
azure-sentinel-canary[bot] Feb 24, 2023
5374b3e
Exported file: SUNBURST and SUPERNOVA backdoor hashes (Normalized Fil…
azure-sentinel-canary[bot] Feb 24, 2023
4772e7b
Exported file: SUNBURST and SUPERNOVA backdoor hashes.json.json
azure-sentinel-canary[bot] Feb 24, 2023
4eb9c38
Exported file: SUNBURST network beacons.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a4d46cf
Exported file: SUNBURST suspicious SolarWinds child processes (Normal…
azure-sentinel-canary[bot] Feb 24, 2023
2dfb912
Exported file: SUNBURST suspicious SolarWinds child processes.json.json
azure-sentinel-canary[bot] Feb 24, 2023
98e9e7d
Exported file: SUNSPOT log file creation.json.json
azure-sentinel-canary[bot] Feb 24, 2023
055572f
Exported file: SUNSPOT malware hashes.json.json
azure-sentinel-canary[bot] Feb 24, 2023
d25b486
Exported file: SUPERNOVA webshell.json.json
azure-sentinel-canary[bot] Feb 24, 2023
c887b32
Exported file: Security Event log cleared.json.json
azure-sentinel-canary[bot] Feb 24, 2023
bc7ad33
Exported file: Security Service Registry ACL Modification.json.json
azure-sentinel-canary[bot] Feb 24, 2023
4d132bd
Exported file: SecurityEvent - Multiple authentication failures follo…
azure-sentinel-canary[bot] Feb 24, 2023
b3e5636
Exported file: Sensitive Azure Key Vault operations.json.json
azure-sentinel-canary[bot] Feb 24, 2023
17fb2f1
Exported file: Several deny actions registered.json.json
azure-sentinel-canary[bot] Feb 24, 2023
bd60391
Exported file: SharePointFileOperation via devices with previously un…
azure-sentinel-canary[bot] Feb 24, 2023
1f378e8
Exported file: SharePointFileOperation via previously unseen IPs.json…
azure-sentinel-canary[bot] Feb 24, 2023
adc56f1
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Feb 24, 2023
cd6033f
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Feb 24, 2023
38bdfb6
Exported file: Solorigate Defender Detections.json.json
azure-sentinel-canary[bot] Feb 24, 2023
d6c61f8
Exported file: Solorigate Domains Found in VM Insights.json.json
azure-sentinel-canary[bot] Feb 24, 2023
2937ef4
Exported file: Solorigate Named Pipe.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a0356c9
Exported file: Solorigate Network Beacon.json.json
azure-sentinel-canary[bot] Feb 24, 2023
6ccda06
Exported file: Squid proxy events for ToR proxies.json.json
azure-sentinel-canary[bot] Feb 24, 2023
ba1a18d
Exported file: Squid proxy events related to mining pools.json.json
azure-sentinel-canary[bot] Feb 24, 2023
838135c
Exported file: Starting or Stopping HealthService to Avoid Detection.…
azure-sentinel-canary[bot] Feb 24, 2023
7491725
Exported file: Successful SSH brute force attack.json.json
azure-sentinel-canary[bot] Feb 24, 2023
f153973
Exported file: Successful logon from IP and failure from a different …
azure-sentinel-canary[bot] Feb 24, 2023
b7e6ce7
Exported file: Suspicious Resource deployment.json.json
azure-sentinel-canary[bot] Feb 24, 2023
198c45f
Exported file: Suspicious Service Principal creation activity.json.json
azure-sentinel-canary[bot] Feb 24, 2023
38dc00d
Exported file: Suspicious application consent for offline access.json…
azure-sentinel-canary[bot] Feb 24, 2023
75731b7
Exported file: Suspicious application consent similar to O365 Attack …
azure-sentinel-canary[bot] Feb 24, 2023
bcbf3cd
Exported file: Suspicious application consent similar to PwnAuth.json…
azure-sentinel-canary[bot] Feb 24, 2023
d9a9eb9
Exported file: Suspicious granting of permissions to an account.json.…
azure-sentinel-canary[bot] Feb 24, 2023
6bef292
Exported file: Suspicious link sharing pattern.json.json
azure-sentinel-canary[bot] Feb 24, 2023
cbf5311
Exported file: Suspicious number of resource creation or deployment a…
azure-sentinel-canary[bot] Feb 24, 2023
9bb1327
Exported file: TEARDROP memory-only dropper.json.json
azure-sentinel-canary[bot] Feb 24, 2023
ba5d351
Exported file: THALLIUM domains included in DCU takedown.json.json
azure-sentinel-canary[bot] Feb 24, 2023
8773521
Exported file: TI map Domain entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Feb 24, 2023
fef3a2e
Exported file: TI map Domain entity to DnsEvent.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a04d1a1
Exported file: TI map Domain entity to PaloAlto.json.json
azure-sentinel-canary[bot] Feb 24, 2023
bb22825
Exported file: TI map Domain entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Feb 24, 2023
e2a9994
Exported file: TI map Domain entity to Syslog.json.json
azure-sentinel-canary[bot] Feb 24, 2023
c2fb72e
Exported file: TI map Email entity to AzureActivity.json.json
azure-sentinel-canary[bot] Feb 24, 2023
adce985
Exported file: TI map Email entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Feb 24, 2023
79c537f
Exported file: TI map Email entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Feb 24, 2023
7aef2a4
Exported file: TI map Email entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Feb 24, 2023
fb14c81
Exported file: TI map Email entity to SecurityEvent.json.json
azure-sentinel-canary[bot] Feb 24, 2023
e58cff7
Exported file: TI map Email entity to SigninLogs.json.json
azure-sentinel-canary[bot] Feb 24, 2023
25547af
Exported file: TI map File Hash to CommonSecurityLog Event.json.json
azure-sentinel-canary[bot] Feb 24, 2023
571f9d2
Exported file: TI map File Hash to Security Event.json.json
azure-sentinel-canary[bot] Feb 24, 2023
0da1127
Exported file: TI map IP entity to AWSCloudTrail.json.json
azure-sentinel-canary[bot] Feb 24, 2023
5f8d50f
Exported file: TI map IP entity to AppServiceHTTPLogs.json.json
azure-sentinel-canary[bot] Feb 24, 2023
ae611e9
Exported file: TI map IP entity to Azure Key Vault logs.json.json
azure-sentinel-canary[bot] Feb 24, 2023
8e03617
Exported file: TI map IP entity to Azure SQL Security Audit Events.js…
azure-sentinel-canary[bot] Feb 24, 2023
bcfdcd6
Exported file: TI map IP entity to AzureActivity.json.json
azure-sentinel-canary[bot] Feb 24, 2023
d45a159
Exported file: TI map IP entity to AzureFirewall.json.json
azure-sentinel-canary[bot] Feb 24, 2023
975d78d
Exported file: TI map IP entity to AzureNetworkAnalytics_CL (NSG Flow…
azure-sentinel-canary[bot] Feb 24, 2023
da05e3b
Exported file: TI map IP entity to DnsEvents.json.json
azure-sentinel-canary[bot] Feb 24, 2023
e16281a
Exported file: TI map IP entity to Duo Security.json.json
azure-sentinel-canary[bot] Feb 24, 2023
0f02198
Exported file: TI map IP entity to GitHub_CL.json.json
azure-sentinel-canary[bot] Feb 24, 2023
5203cd3
Exported file: TI map IP entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Feb 24, 2023
d48b152
Exported file: TI map IP entity to SigninLogs.json.json
azure-sentinel-canary[bot] Feb 24, 2023
3a91933
Exported file: TI map IP entity to VMConnection.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a431a94
Exported file: TI map IP entity to W3CIISLog.json.json
azure-sentinel-canary[bot] Feb 24, 2023
1d9d4e9
Exported file: TI map IP entity to WireData.json.json
azure-sentinel-canary[bot] Feb 24, 2023
f39bab9
Exported file: TI map URL entity to AuditLogs.json.json
azure-sentinel-canary[bot] Feb 24, 2023
82cc70a
Exported file: TI map URL entity to OfficeActivity data.json.json
azure-sentinel-canary[bot] Feb 24, 2023
1bd1b86
Exported file: TI map URL entity to PaloAlto data.json.json
azure-sentinel-canary[bot] Feb 24, 2023
19222d6
Exported file: TI map URL entity to SecurityAlert data.json.json
azure-sentinel-canary[bot] Feb 24, 2023
2209ca7
Exported file: TI map URL entity to Syslog data.json.json
azure-sentinel-canary[bot] Feb 24, 2023
0907b52
Exported file: Threats detected by Eset.json.json
azure-sentinel-canary[bot] Feb 24, 2023
fd9b17d
Exported file: Time series anomaly detection for total volume of traf…
azure-sentinel-canary[bot] Feb 24, 2023
cc17d14
Exported file: Time series anomaly for data size transferred to publi…
azure-sentinel-canary[bot] Feb 24, 2023
f0578c7
Exported file: Trust Monitor Event.json.json
azure-sentinel-canary[bot] Feb 24, 2023
b790b14
Exported file: User Accessed Suspicious URL Categories.json.json
azure-sentinel-canary[bot] Feb 24, 2023
eb9c9db
Exported file: User Accounts - Sign in Failure due to CA Spikes.json.…
azure-sentinel-canary[bot] Feb 24, 2023
c733797
Exported file: User Assigned Privileged Role.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a6b8588
Exported file: User Login from Different Countries within 3 hours.jso…
azure-sentinel-canary[bot] Feb 24, 2023
f31f4f0
Exported file: User account added to built in domain local or global …
azure-sentinel-canary[bot] Feb 24, 2023
6866f99
Exported file: User account created and deleted within 10 mins.json.json
azure-sentinel-canary[bot] Feb 24, 2023
05aa117
Exported file: User account enabled and disabled within 10 mins.json.…
azure-sentinel-canary[bot] Feb 24, 2023
ec9072c
Exported file: User added to Azure Active Directory Privileged Groups…
azure-sentinel-canary[bot] Feb 24, 2023
7f5d4c3
Exported file: User agent search for log4j exploitation attempt.json.…
azure-sentinel-canary[bot] Feb 24, 2023
2120214
Exported file: User joining Zoom meeting from suspicious timezone.jso…
azure-sentinel-canary[bot] Feb 24, 2023
2bcf829
Exported file: User login from different countries within 3 hours (Us…
azure-sentinel-canary[bot] Feb 24, 2023
153e1d5
Exported file: Users searching for VIP user activity.json.json
azure-sentinel-canary[bot] Feb 24, 2023
8801ee7
Exported file: Valid Analytic Rule 1.json.json
azure-sentinel-canary[bot] Feb 24, 2023
3f21535
Exported file: Vectra AI Detect - Detections with High Severity.json.…
azure-sentinel-canary[bot] Feb 24, 2023
3f62294
Exported file: Vectra AI Detect - New Campaign Detected.json.json
azure-sentinel-canary[bot] Feb 24, 2023
281d907
Exported file: Vectra AI Detect - Suspected Compromised Account.json.…
azure-sentinel-canary[bot] Feb 24, 2023
2bbf915
Exported file: Vectra AI Detect - Suspected Compromised Host.json.json
azure-sentinel-canary[bot] Feb 24, 2023
4f008e7
Exported file: Vectra AI Detect - Suspicious Behaviors.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a2a4da5
Exported file: Vulnerable Machines related to OMIGOD CVE-2021-38647.j…
azure-sentinel-canary[bot] Feb 24, 2023
5458406
Exported file: Vulnerable Machines related to log4j CVE-2021-44228.js…
azure-sentinel-canary[bot] Feb 24, 2023
ecd3454
Exported file: Wazuh - Large Number of Web errors from an IP.json.json
azure-sentinel-canary[bot] Feb 24, 2023
db3d61f
Exported file: Web sites blocked by Eset.json.json
azure-sentinel-canary[bot] Feb 24, 2023
818a13f
Exported file: Zoom E2E Encryption Disabled.json.json
azure-sentinel-canary[bot] Feb 24, 2023
9099d03
Exported file: new file added -- 2_14_2013.json.json
azure-sentinel-canary[bot] Feb 24, 2023
a5f85fb
Exported file: new test rule 1.json.json
azure-sentinel-canary[bot] Feb 24, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "ThreatIntelligence",
"apiVersion": "2022-09-01-preview",
"properties": {
"alertRuleTemplateName": "0dd422ee-e6af-4204-b219-f59ac172e4c6",
"severity": "Medium",
"tactics": [
"Persistence",
"LateralMovement"
],
"techniques": [],
"displayName": "(Preview) Microsoft Threat Intelligence Analytics",
"enabled": true,
"description": "This rule generates an alert when a Microsoft Threat Intelligence Indicator gets matched with your event logs. The alerts are very high fidelity and are turned ON by default. \n\nNote : It is advised to turn off any custom alert rules which match the threat intelligence indicators with the same event logs matched by this analytics to prevent duplicate alerts."
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/516cc0be-cc97-486b-928e-0e222352ba46')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/516cc0be-cc97-486b-928e-0e222352ba46')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet DomainTIs= ThreatIntelligenceIndicator\n | where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n // Picking up only IOC's that contain the entities we want\n | where isnotempty(DomainName)\n | where Active == true\n | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId;\nlet Domains= toscalar(DomainTIs | where isnotempty(DomainName) |summarize make_set(DomainName));\nDomainTIs\n | join (\n imDns(starttime=ago(dt_lookBack), domain_has_any=(Domains))\n | extend DNS_TimeGenerated = TimeGenerated\n) on $left.DomainName==$right.DnsQuery\n| where DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, Url, DNS_TimeGenerated, Dvc, SrcIpAddr, DnsQuery, QueryType\n| extend timestamp = DNS_TimeGenerated, HostCustomEntity = Dvc, IPCustomEntity = SrcIpAddr, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map Domain entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any Domain IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "999e9f5d-db4a-4b07-a206-29c4e667b7e8"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet IP_TI = (ThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n// As there is potentially more than 1 indicator type for matching IP, taking NetworkIP first, then others if that is empty.\n// Taking the first non-empty value based on potential IOC match availability\n| extend TI_ipEntity = coalesce(NetworkIP, NetworkDestinationIP, NetworkSourceIP,EmailSourceIpAddress,\"\")\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId);\nlet TI_IP_List=IP_TI | summarize make_set( TI_ipEntity);\nimDns(starttime=ago(dt_lookBack), response_has_any_prefix=todynamic(toscalar(TI_IP_List)))\n | extend tilist = toscalar(TI_IP_List)\n | mv-expand tilist\n | extend SingleIP=tostring(tilist)\n | project-away tilist\n | where has_ipv4(DnsResponseName, SingleIP)\n | extend DNS_TimeGenerated = TimeGenerated\n| join IP_TI\n on $left.SingleIP == $right.TI_ipEntity\n| where DNS_TimeGenerated >= TimeGenerated and DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore, DNS_TimeGenerated,\nTI_ipEntity, Dvc, EventId, SubType, SrcIpAddr, DnsQuery, DnsResponseName, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress\n| extend timestamp = DNS_TimeGenerated, IPCustomEntity = TI_ipEntity, HostCustomEntity = Dvc, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map IP entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any IP IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "67775878-7f8b-4380-ac54-115e1e828901"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT6H",
"queryPeriod": "PT7H",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "SingleAlert"
},
"severity": "High",
"query": "// Rule Name - (Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations\r\n// Rule Description - Sensitive Data Access Outside Organziational Geolocations\r\n// Prerequisite 1: Onboard Azure Infomation Protection (https://docs.microsoft.com/en-us/azure/information-protection/requirements)\r\n// Prerequisite 2: Install AIP Unified Labeling Scanner (https://docs.microsoft.com/en-us/azure/information-protection/tutorial-install-scanner)\r\n// Prerequisite 3: Enable Azure Information Protection Connector (https://docs.microsoft.com/en-us/azure/sentinel/data-connectors-reference#azure-information-protection)\r\n// Prerequisite 4: Enable Azure Active Directory Connector (hhttps://docs.microsoft.com/en-us/azure/sentinel/connect-azure-active-directory)\r\nInformationProtectionLogs_CL\r\n| extend UserPrincipalName = UserId_s\r\n| where LabelName_s <> \"\"\r\n| join (SigninLogs) on UserPrincipalName\r\n| extend City = tostring(LocationDetails.city)\r\n// | where City <> \"New York\" // Configure Location Details within Organizational Requirements\r\n| extend State = tostring(LocationDetails.state)\r\n// | where State <> \"Texas\" // Configure Location Details within Organizational Requirements\r\n| extend Country_Region = tostring(LocationDetails.countryOrRegion)\r\n// | where Country_Region <> \"US\" // Configure Location Details within Organizational Requirements\r\n| summarize count() by UserPrincipalName, LabelName_s, Activity_s, City, State, Country_Region\r\n| sort by count_ desc\r\n| limit 250",
"suppressionDuration": "PT5H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5H",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": [],
"groupByCustomDetails": []
}
},
"customDetails": {
"Activity": "Activity_s",
"Where": "City"
},
"entityMappings": [
{
"entityType": "Account",
"fieldMappings": [
{
"identifier": "AadUserId",
"columnName": "UserPrincipalName"
}
]
}
],
"tactics": [],
"techniques": null,
"displayName": "(Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations",
"enabled": false,
"description": "Sensitive Data Access Outside Organziational Geolocations",
"alertRuleTemplateName": null
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT10M",
"queryPeriod": "PT10M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let default_file_ext_blocklist = dynamic(['.ps1', '.vbs', '.bat', '.scr']);\nlet custom_file_ext_blocklist=toscalar(_GetWatchlist('RiskyFileTypes') | extend Extension=column_ifexists(\"Extension\",\"\") | where isnotempty(Extension) | summarize make_set(Extension));\nlet file_ext_blocklist = array_concat(default_file_ext_blocklist, custom_file_ext_blocklist);\nimWebSession(url_has_any=file_ext_blocklist, eventresult='Success')\n| extend requestedFileName=tostring(split(tostring(parse_url(Url)[\"Path\"]),'/')[-1])\n| extend requestedFileExt=extract(@(\\.\\w+)$,1,requestedFileName, typeof(string))\n| where requestedFileExtension in (file_ext_blocklist)\n| summarize LastAttemptTime=max(TimeGenerated), NumFailedAttempts=count() by SrcIpAddr, requestedFileName, Url\n| extend IPCustomEntity = SrcIpAddr, UrlCustomEntity=Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"InitialAccess"
],
"techniques": null,
"displayName": "A client made a web request to a potentially harmful file (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request to a URL that holds a file type, including .ps1, .bat, .vbs, and .scr that can be harmful if downloaded. This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, deploy the Advanced SIEM information Model (ASIM).\nTo use this analytics rule, deploy the [Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM)",
"alertRuleTemplateName": "09c49590-4e9d-4da9-a34d-17222d0c9e7e"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT15M",
"queryPeriod": "PT15M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let threatCategory=\"Powershell\";\nlet knownUserAgentsIndicators = materialize(externaldata(UserAgent:string, Category:string)\n [ @\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/UnusualUserAgents.csv\"] \n with(format=\"csv\", ignoreFirstRecord=True));\nlet knownUserAgents=toscalar(knownUserAgentsIndicators | where Category==threatCategory | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet customUserAgents=toscalar(_GetWatchlist(\"UnusualUserAgents\") | where SearchKey==threatCategory | extend UserAgent=column_ifexists(\"UserAgent\",\"\") | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet fullUAList = array_concat(knownUserAgents,customUserAgents);\nimWebSession(httpuseragent_has_any=fullUAList)\n| project SrcIpAddr, Url, TimeGenerated,HttpUserAgent, SrcUsername\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"CommandAndControl",
"DefenseEvasion"
],
"techniques": null,
"displayName": "A host is potentially running PowerShell to send HTTP(S) requests (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request with a user agent header known to belong PowerShell. <br>You can add custom Powershell indicating User-Agent headers using a watchlist, for more information refer to the [UnusualUserAgents Watchlist](https://aka.ms/ASimUnusualUserAgentsWatchlist).<br><br>This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, [deploy the Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM).",
"alertRuleTemplateName": "42436753-9944-4d70-801c-daaa4d19ddd2"
}
}
]
}
Loading