Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
375 commits
Select commit Hold shift + click to select a range
d1a92bf
Exported file: Dev-0228 File Path Hashes November 2021 - ASIM.json.json
azure-sentinel-canary[bot] Feb 25, 2023
57e0612
Exported file: Dev-0228 File Path Hashes November 2021.json.json
azure-sentinel-canary[bot] Feb 25, 2023
94e03b3
Exported file: Distributed Password cracking attempts in AzureAD.json…
azure-sentinel-canary[bot] Feb 25, 2023
ab32160
Exported file: Duplicate Rule DisplayName 1 (1).json.json
azure-sentinel-canary[bot] Feb 25, 2023
8baafdf
Exported file: Duplicate Rule DisplayName 1.json.json
azure-sentinel-canary[bot] Feb 25, 2023
45907cd
Exported file: Email access via active sync.json.json
azure-sentinel-canary[bot] Feb 25, 2023
d990d37
Exported file: Excessive Amount of Denied Connections from a Single S…
azure-sentinel-canary[bot] Feb 25, 2023
d1b5f8b
Exported file: Excessive Denied Proxy Traffic.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0add57e
Exported file: Excessive Failed Authentication from Invalid Inputs.js…
azure-sentinel-canary[bot] Feb 25, 2023
87d2ca6
Exported file: Excessive NXDOMAIN DNS Queries (Normalized DNS).json.json
azure-sentinel-canary[bot] Feb 25, 2023
b66a8de
Exported file: Excessive NXDOMAIN DNS Queries.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c6ca33f
Exported file: Excessive Windows logon failures.json.json
azure-sentinel-canary[bot] Feb 25, 2023
f111ceb
Exported file: Excessive number of failed connections from a single s…
azure-sentinel-canary[bot] Feb 25, 2023
80b8275
Exported file: Exchange AuditLog disabled.json.json
azure-sentinel-canary[bot] Feb 25, 2023
1e24a66
Exported file: Exchange OAB Virtual Directory Attribute Containing Po…
azure-sentinel-canary[bot] Feb 25, 2023
b809036
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection (1).…
azure-sentinel-canary[bot] Feb 25, 2023
577a2a5
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection.json…
azure-sentinel-canary[bot] Feb 25, 2023
1ffe943
Exported file: Exchange Server Vulnerabilities Disclosed March 2021 I…
azure-sentinel-canary[bot] Feb 25, 2023
c5268e1
Exported file: Exchange workflow MailItemsAccessed operation anomaly.…
azure-sentinel-canary[bot] Feb 25, 2023
cfd2325
Exported file: Explicit MFA Deny.json.json
azure-sentinel-canary[bot] Feb 25, 2023
561f61c
Exported file: External Upstream Source Added to Azure DevOps Feed.js…
azure-sentinel-canary[bot] Feb 25, 2023
038bdf0
Exported file: External User Access Enabled.json.json
azure-sentinel-canary[bot] Feb 25, 2023
722fb01
Exported file: External guest invitations by default guest followed b…
azure-sentinel-canary[bot] Feb 25, 2023
a59046b
Exported file: External user added and removed in short timeframe.jso…
azure-sentinel-canary[bot] Feb 25, 2023
6144c69
Exported file: Failed AWS Console logons but success logon to AzureAD…
azure-sentinel-canary[bot] Feb 25, 2023
b99cdf5
Exported file: Failed AzureAD logons but success logon to AWS Console…
azure-sentinel-canary[bot] Feb 25, 2023
66b518f
Exported file: Failed AzureAD logons but success logon to host.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0dc97eb
Exported file: Failed Logins from Unknown or Invalid User.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0d2d7b1
Exported file: Failed host logons but success logon to AzureAD.json.json
azure-sentinel-canary[bot] Feb 25, 2023
e8240cd
Exported file: Failed login attempts to Azure Portal.json.json
azure-sentinel-canary[bot] Feb 25, 2023
fa3ba3a
Exported file: Failed logon attempts by valid accounts within 10 mins…
azure-sentinel-canary[bot] Feb 25, 2023
c415035
Exported file: Failed logon attempts in authpriv.json.json
azure-sentinel-canary[bot] Feb 25, 2023
5e82b8c
Exported file: First access credential added to Application or Servic…
azure-sentinel-canary[bot] Feb 25, 2023
bfcd613
Exported file: Fortinet - Beacon pattern detected.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3f6ae55
Exported file: Full Admin policy created and then attached to Roles, …
azure-sentinel-canary[bot] Feb 25, 2023
183b700
Exported file: Gain Code Execution on ADFS Server via Remote WMI Exec…
azure-sentinel-canary[bot] Feb 25, 2023
1a1a67b
Exported file: Gain Code Execution on ADFS Server via SMB + Remote Se…
azure-sentinel-canary[bot] Feb 25, 2023
f5757dd
Exported file: GitHub Activites from a New Country.json.json
azure-sentinel-canary[bot] Feb 25, 2023
78347a5
Exported file: GitHub Security Vulnerability in Repository.json.json
azure-sentinel-canary[bot] Feb 25, 2023
864ad44
Exported file: GitHub Signin Burst from Multiple Locations.json.json
azure-sentinel-canary[bot] Feb 25, 2023
45f9be6
Exported file: GitHub Two Factor Auth Disable.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0fb9fe2
Exported file: Group created then added to built in domain local or g…
azure-sentinel-canary[bot] Feb 25, 2023
196429b
Exported file: HAFNIUM New UM Service Child Process.json.json
azure-sentinel-canary[bot] Feb 25, 2023
993eb56
Exported file: HAFNIUM Suspicious Exchange Request.json.json
azure-sentinel-canary[bot] Feb 25, 2023
626e5e6
Exported file: HAFNIUM Suspicious File Downloads_.json.json
azure-sentinel-canary[bot] Feb 25, 2023
049b126
Exported file: HAFNIUM Suspicious UM Service Error.json.json
azure-sentinel-canary[bot] Feb 25, 2023
2c9afc7
Exported file: HAFNIUM UM Service writing suspicious file.json.json
azure-sentinel-canary[bot] Feb 25, 2023
cbfe759
Exported file: High Number of Urgent Vulnerabilities Detected (1).jso…
azure-sentinel-canary[bot] Feb 25, 2023
031e7c9
Exported file: High Number of Urgent Vulnerabilities Detected.json.json
azure-sentinel-canary[bot] Feb 25, 2023
4c510ea
Exported file: High Urgency Cyberpion Action Items.json.json
azure-sentinel-canary[bot] Feb 25, 2023
82dc59b
Exported file: High count of connections by client IP on many ports.j…
azure-sentinel-canary[bot] Feb 25, 2023
dc808f2
Exported file: High count of failed attempts from same client IP.json…
azure-sentinel-canary[bot] Feb 25, 2023
b184b1d
Exported file: High count of failed logons by a user.json.json
azure-sentinel-canary[bot] Feb 25, 2023
897c860
Exported file: IP with multiple failed Azure AD logins successfully l…
azure-sentinel-canary[bot] Feb 25, 2023
dc518ed
Exported file: Known Barium IP.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0f76146
Exported file: Known Barium domains.json.json
azure-sentinel-canary[bot] Feb 25, 2023
28e7d64
Exported file: Known CERIUM domains and hashes.json.json
azure-sentinel-canary[bot] Feb 25, 2023
262568b
Exported file: Known GALLIUM domains and hashes.json.json
azure-sentinel-canary[bot] Feb 25, 2023
cd0a7a9
Exported file: Known IRIDIUM IP.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0de1a99
Exported file: Known Malware Detected.json.json
azure-sentinel-canary[bot] Feb 25, 2023
11daedc
Exported file: Known Manganese IP and UserAgent activity.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c7c361f
Exported file: Known NICKEL domains and hashes.json.json
azure-sentinel-canary[bot] Feb 25, 2023
d10016f
Exported file: Known PHOSPHORUS group domains_IP - October 2020.json.…
azure-sentinel-canary[bot] Feb 25, 2023
06ec822
Exported file: Known Phosphorus group domains_IP.json.json
azure-sentinel-canary[bot] Feb 25, 2023
075a025
Exported file: Known STRONTIUM group domains - July 2019.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c711ade
Exported file: Known ZINC Comebacker and Klackring malware hashes.jso…
azure-sentinel-canary[bot] Feb 25, 2023
7171ffe
Exported file: Known ZINC related maldoc hash.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3b1562a
Exported file: Linked Malicious Storage Artifacts.json.json
azure-sentinel-canary[bot] Feb 25, 2023
2311226
Exported file: Log4j vulnerability exploit aka Log4Shell IP IOC.json.…
azure-sentinel-canary[bot] Feb 25, 2023
279db87
Exported file: Login to AWS Management Console without MFA.json.json
azure-sentinel-canary[bot] Feb 25, 2023
1e62dc8
Exported file: MFA Rejected by User.json.json
azure-sentinel-canary[bot] Feb 25, 2023
e3f5241
Exported file: MFA disabled for a user.json.json
azure-sentinel-canary[bot] Feb 25, 2023
404d9a6
Exported file: MSHTML vulnerability CVE-2021-40444 attack.json.json
azure-sentinel-canary[bot] Feb 25, 2023
455912e
Exported file: Mail redirect via ExO transport rule.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c8d00d7
Exported file: Mail.Read Permissions Granted to Application.json.json
azure-sentinel-canary[bot] Feb 25, 2023
af809dd
Exported file: Malformed user agent.json.json
azure-sentinel-canary[bot] Feb 25, 2023
ab04cec
Exported file: Malicious Inbox Rule.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c562dc4
Exported file: Malicious web application requests linked with Microso…
azure-sentinel-canary[bot] Feb 25, 2023
1106261
Exported file: Malware in the recycle bin (Normalized Process Events)…
azure-sentinel-canary[bot] Feb 25, 2023
bc031e3
Exported file: Malware in the recycle bin.json.json
azure-sentinel-canary[bot] Feb 25, 2023
2ea5a2a
Exported file: Mass secret retrieval from Azure Key Vault.json.json
azure-sentinel-canary[bot] Feb 25, 2023
79531f7
Exported file: Microsoft COVID-19 file hash indicator matches.json.json
azure-sentinel-canary[bot] Feb 25, 2023
6c551c9
Exported file: Modified domain federation trust settings.json.json
azure-sentinel-canary[bot] Feb 25, 2023
f961b31
Exported file: Monitor AWS Credential abuse or hijacking.json.json
azure-sentinel-canary[bot] Feb 25, 2023
96829d7
Exported file: Multiple Password Reset by user.json.json
azure-sentinel-canary[bot] Feb 25, 2023
48a904a
Exported file: Multiple RDP connections from Single System.json.json
azure-sentinel-canary[bot] Feb 25, 2023
7187ac6
Exported file: Multiple Teams deleted by a single user.json.json
azure-sentinel-canary[bot] Feb 25, 2023
afb31a5
Exported file: Multiple users email forwarded to same destination.jso…
azure-sentinel-canary[bot] Feb 25, 2023
092afdb
Exported file: NOBELIUM - Domain and IP IOCs - March 2021.json.json
azure-sentinel-canary[bot] Feb 25, 2023
d57400d
Exported file: NOBELIUM - Domain, Hash and IP IOCs - May 2021.json.json
azure-sentinel-canary[bot] Feb 25, 2023
6bde09e
Exported file: NOBELIUM - Script payload stored in Registry.json.json
azure-sentinel-canary[bot] Feb 25, 2023
a54dea1
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Feb 25, 2023
ab132ff
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Feb 25, 2023
d3bacd6
Exported file: NOBELIUM IOCs related to FoggyWeb backdoor.json.json
azure-sentinel-canary[bot] Feb 25, 2023
a300c42
Exported file: Network endpoint to host executable correlation.json.json
azure-sentinel-canary[bot] Feb 25, 2023
38e67a1
Exported file: New Agent Added to Pool by New User or Added to a New …
azure-sentinel-canary[bot] Feb 25, 2023
b0ec106
Exported file: New CloudShell User.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3704905
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Feb 25, 2023
1925fe2
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Feb 25, 2023
e679b08
Exported file: New PA, PCA, or PCAS added to Azure DevOps.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3db6414
Exported file: New UserAgent observed in last 24 hours.json.json
azure-sentinel-canary[bot] Feb 25, 2023
8c7a27c
Exported file: New access credential added to Application or Service …
azure-sentinel-canary[bot] Feb 25, 2023
0424d34
Exported file: New executable via Office FileUploaded Operation.json.…
azure-sentinel-canary[bot] Feb 25, 2023
c87105f
Exported file: New internet-exposed SSH endpoints.json.json
azure-sentinel-canary[bot] Feb 25, 2023
433b15c
Exported file: New user created and added to the built-in administrat…
azure-sentinel-canary[bot] Feb 25, 2023
6afb449
Exported file: Non Domain Controller Active Directory Replication.jso…
azure-sentinel-canary[bot] Feb 25, 2023
b08a024
Exported file: OMI Vulnerability Exploitation.json.json
azure-sentinel-canary[bot] Feb 25, 2023
7d54ce2
Exported file: Office policy tampering.json.json
azure-sentinel-canary[bot] Feb 25, 2023
6203324
Exported file: PIM Elevation Request Rejected.json.json
azure-sentinel-canary[bot] Feb 25, 2023
4a39a2a
Exported file: Palo Alto - possible internal to external port scannin…
azure-sentinel-canary[bot] Feb 25, 2023
d8c54cd
Exported file: Palo Alto - potential beaconing detected.json.json
azure-sentinel-canary[bot] Feb 25, 2023
6d896aa
Exported file: Password spray attack against Azure AD application.jso…
azure-sentinel-canary[bot] Feb 25, 2023
1f8339c
Exported file: Port Scan Detected.json.json
azure-sentinel-canary[bot] Feb 25, 2023
aa0e2d1
Exported file: Possible STRONTIUM attempted credential harvesting - O…
azure-sentinel-canary[bot] Feb 25, 2023
60457bc
Exported file: Possible STRONTIUM attempted credential harvesting - S…
azure-sentinel-canary[bot] Feb 25, 2023
221394a
Exported file: Possible contact with a domain generated by a DGA.json…
azure-sentinel-canary[bot] Feb 25, 2023
3b45701
Exported file: Potential Build Process Compromise - MDE.json.json
azure-sentinel-canary[bot] Feb 25, 2023
864203d
Exported file: Potential Build Process Compromise.json.json
azure-sentinel-canary[bot] Feb 25, 2023
9d56338
Exported file: Potential DGA detected (ASimDNS).json.json
azure-sentinel-canary[bot] Feb 25, 2023
01682ab
Exported file: Potential DGA detected.json.json
azure-sentinel-canary[bot] Feb 25, 2023
e62ece2
Exported file: Potential DHCP Starvation Attack.json.json
azure-sentinel-canary[bot] Feb 25, 2023
b1dcbb3
Exported file: Potential Kerberoasting.json.json
azure-sentinel-canary[bot] Feb 25, 2023
7563411
Exported file: Potential Password Spray Attack (Uses Authentication N…
azure-sentinel-canary[bot] Feb 25, 2023
fad914f
Exported file: Potential Password Spray Attack.json.json
azure-sentinel-canary[bot] Feb 25, 2023
dce285c
Exported file: Powershell Empire cmdlets seen in command line.json.json
azure-sentinel-canary[bot] Feb 25, 2023
cd611ed
Exported file: Privileged Accounts - Sign in Failure Spikes.json.json
azure-sentinel-canary[bot] Feb 25, 2023
8f9a5be
Exported file: Privileged Role Assigned Outside PIM.json.json
azure-sentinel-canary[bot] Feb 25, 2023
183f3fc
Exported file: Probable AdFind Recon Tool Usage (Normalized Process E…
azure-sentinel-canary[bot] Feb 25, 2023
b899297
Exported file: Probable AdFind Recon Tool Usage.json.json
azure-sentinel-canary[bot] Feb 25, 2023
6f67119
Exported file: Process executed from binary hidden in Base64 encoded …
azure-sentinel-canary[bot] Feb 25, 2023
cbba012
Exported file: Process execution frequency anomaly.json.json
azure-sentinel-canary[bot] Feb 25, 2023
f222eee
Exported file: ProofpointPOD - Binary file in attachment.json.json
azure-sentinel-canary[bot] Feb 25, 2023
b1afd9b
Exported file: ProofpointPOD - Email sender IP in TI list.json.json
azure-sentinel-canary[bot] Feb 25, 2023
50acccd
Exported file: ProofpointPOD - Email sender in TI list.json.json
azure-sentinel-canary[bot] Feb 25, 2023
15a9441
Exported file: ProofpointPOD - High risk message not discarded.json.json
azure-sentinel-canary[bot] Feb 25, 2023
65565f9
Exported file: ProofpointPOD - Multiple archived attachments to the s…
azure-sentinel-canary[bot] Feb 25, 2023
5e69ae2
Exported file: ProofpointPOD - Multiple large emails to the same reci…
azure-sentinel-canary[bot] Feb 25, 2023
e71d552
Exported file: ProofpointPOD - Multiple protected emails to unknown r…
azure-sentinel-canary[bot] Feb 25, 2023
8fb79f5
Exported file: ProofpointPOD - Possible data exfiltration to private …
azure-sentinel-canary[bot] Feb 25, 2023
3a0e7aa
Exported file: ProofpointPOD - Suspicious attachment.json.json
azure-sentinel-canary[bot] Feb 25, 2023
ef119bb
Exported file: ProofpointPOD - Weak ciphers.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0656d1e
Exported file: PulseConnectSecure - Large Number of Distinct Failed U…
azure-sentinel-canary[bot] Feb 25, 2023
a084a41
Exported file: PulseConnectSecure - Potential Brute Force Attempts.js…
azure-sentinel-canary[bot] Feb 25, 2023
1e56ad0
Exported file: RDP Nesting.json.json
azure-sentinel-canary[bot] Feb 25, 2023
8fa7eb7
Exported file: Rare RDP Connections.json.json
azure-sentinel-canary[bot] Feb 25, 2023
f85627a
Exported file: Rare and potentially high-risk Office operations.json.…
azure-sentinel-canary[bot] Feb 25, 2023
fb54c3d
Exported file: Rare application consent.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3305a4a
Exported file: Rare client observed with high reverse DNS lookup coun…
azure-sentinel-canary[bot] Feb 25, 2023
b8ba60d
Exported file: Rare subscription-level operations in Azure.json.json
azure-sentinel-canary[bot] Feb 25, 2023
a35b4b3
Exported file: Request for single resource on domain.json.json
azure-sentinel-canary[bot] Feb 25, 2023
d5b7d02
Exported file: SOURGUM Actor IOC - July 2021.json.json
azure-sentinel-canary[bot] Feb 25, 2023
9c4063e
Exported file: SSH - Potential Brute Force.json.json
azure-sentinel-canary[bot] Feb 25, 2023
e0782b8
Exported file: SUNBURST and SUPERNOVA backdoor hashes (Normalized Fil…
azure-sentinel-canary[bot] Feb 25, 2023
7863937
Exported file: SUNBURST and SUPERNOVA backdoor hashes.json.json
azure-sentinel-canary[bot] Feb 25, 2023
062793a
Exported file: SUNBURST network beacons.json.json
azure-sentinel-canary[bot] Feb 25, 2023
cb6cb19
Exported file: SUNBURST suspicious SolarWinds child processes (Normal…
azure-sentinel-canary[bot] Feb 25, 2023
50ec41d
Exported file: SUNBURST suspicious SolarWinds child processes.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0df0f82
Exported file: SUNSPOT log file creation.json.json
azure-sentinel-canary[bot] Feb 25, 2023
d04d3e5
Exported file: SUNSPOT malware hashes.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3d02aca
Exported file: SUPERNOVA webshell.json.json
azure-sentinel-canary[bot] Feb 25, 2023
e54199e
Exported file: Security Event log cleared.json.json
azure-sentinel-canary[bot] Feb 25, 2023
66e78ec
Exported file: Security Service Registry ACL Modification.json.json
azure-sentinel-canary[bot] Feb 25, 2023
64cbfc0
Exported file: SecurityEvent - Multiple authentication failures follo…
azure-sentinel-canary[bot] Feb 25, 2023
2008ae9
Exported file: Sensitive Azure Key Vault operations.json.json
azure-sentinel-canary[bot] Feb 25, 2023
02d7ac4
Exported file: Several deny actions registered.json.json
azure-sentinel-canary[bot] Feb 25, 2023
84931ba
Exported file: SharePointFileOperation via devices with previously un…
azure-sentinel-canary[bot] Feb 25, 2023
d760fd7
Exported file: SharePointFileOperation via previously unseen IPs.json…
azure-sentinel-canary[bot] Feb 25, 2023
fa625c6
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Feb 25, 2023
7d4337d
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Feb 25, 2023
d4642d2
Exported file: Solorigate Defender Detections.json.json
azure-sentinel-canary[bot] Feb 25, 2023
116a98c
Exported file: Solorigate Domains Found in VM Insights.json.json
azure-sentinel-canary[bot] Feb 25, 2023
2a7b4ca
Exported file: Solorigate Named Pipe.json.json
azure-sentinel-canary[bot] Feb 25, 2023
21cbb44
Exported file: Solorigate Network Beacon.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c71e04c
Exported file: Squid proxy events for ToR proxies.json.json
azure-sentinel-canary[bot] Feb 25, 2023
acf185a
Exported file: Squid proxy events related to mining pools.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c41e8e0
Exported file: Starting or Stopping HealthService to Avoid Detection.…
azure-sentinel-canary[bot] Feb 25, 2023
f212e93
Exported file: Successful SSH brute force attack.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3986ee3
Exported file: Successful logon from IP and failure from a different …
azure-sentinel-canary[bot] Feb 25, 2023
f8a2896
Exported file: Suspicious Resource deployment.json.json
azure-sentinel-canary[bot] Feb 25, 2023
0422d83
Exported file: Suspicious Service Principal creation activity.json.json
azure-sentinel-canary[bot] Feb 25, 2023
ced8ea3
Exported file: Suspicious application consent for offline access.json…
azure-sentinel-canary[bot] Feb 25, 2023
4c592dd
Exported file: Suspicious application consent similar to O365 Attack …
azure-sentinel-canary[bot] Feb 25, 2023
1b21fd1
Exported file: Suspicious application consent similar to PwnAuth.json…
azure-sentinel-canary[bot] Feb 25, 2023
2f8db4d
Exported file: Suspicious granting of permissions to an account.json.…
azure-sentinel-canary[bot] Feb 25, 2023
88c4cb2
Exported file: Suspicious link sharing pattern.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3e87784
Exported file: Suspicious number of resource creation or deployment a…
azure-sentinel-canary[bot] Feb 25, 2023
f98be6c
Exported file: TEARDROP memory-only dropper.json.json
azure-sentinel-canary[bot] Feb 25, 2023
e7db665
Exported file: THALLIUM domains included in DCU takedown.json.json
azure-sentinel-canary[bot] Feb 25, 2023
d2fe993
Exported file: TI map Domain entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Feb 25, 2023
22e7757
Exported file: TI map Domain entity to DnsEvent.json.json
azure-sentinel-canary[bot] Feb 25, 2023
d177af1
Exported file: TI map Domain entity to PaloAlto.json.json
azure-sentinel-canary[bot] Feb 25, 2023
8683619
Exported file: TI map Domain entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Feb 25, 2023
cc1b255
Exported file: TI map Domain entity to Syslog.json.json
azure-sentinel-canary[bot] Feb 25, 2023
845d414
Exported file: TI map Email entity to AzureActivity.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3b269f5
Exported file: TI map Email entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Feb 25, 2023
bde8eb6
Exported file: TI map Email entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Feb 25, 2023
b227c14
Exported file: TI map Email entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Feb 25, 2023
60ba334
Exported file: TI map Email entity to SecurityEvent.json.json
azure-sentinel-canary[bot] Feb 25, 2023
a1f77e1
Exported file: TI map Email entity to SigninLogs.json.json
azure-sentinel-canary[bot] Feb 25, 2023
542a4a5
Exported file: TI map File Hash to CommonSecurityLog Event.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c789d23
Exported file: TI map File Hash to Security Event.json.json
azure-sentinel-canary[bot] Feb 25, 2023
b6e2a3a
Exported file: TI map IP entity to AWSCloudTrail.json.json
azure-sentinel-canary[bot] Feb 25, 2023
e34d82f
Exported file: TI map IP entity to AppServiceHTTPLogs.json.json
azure-sentinel-canary[bot] Feb 25, 2023
2b81ac1
Exported file: TI map IP entity to Azure Key Vault logs.json.json
azure-sentinel-canary[bot] Feb 25, 2023
bfd57e3
Exported file: TI map IP entity to Azure SQL Security Audit Events.js…
azure-sentinel-canary[bot] Feb 25, 2023
40fc813
Exported file: TI map IP entity to AzureActivity.json.json
azure-sentinel-canary[bot] Feb 25, 2023
7165544
Exported file: TI map IP entity to AzureFirewall.json.json
azure-sentinel-canary[bot] Feb 25, 2023
30760a0
Exported file: TI map IP entity to AzureNetworkAnalytics_CL (NSG Flow…
azure-sentinel-canary[bot] Feb 25, 2023
3bbdfd4
Exported file: TI map IP entity to DnsEvents.json.json
azure-sentinel-canary[bot] Feb 25, 2023
311076d
Exported file: TI map IP entity to Duo Security.json.json
azure-sentinel-canary[bot] Feb 25, 2023
dcd3092
Exported file: TI map IP entity to GitHub_CL.json.json
azure-sentinel-canary[bot] Feb 25, 2023
12b2e43
Exported file: TI map IP entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Feb 25, 2023
11a19d6
Exported file: TI map IP entity to SigninLogs.json.json
azure-sentinel-canary[bot] Feb 25, 2023
5af147d
Exported file: TI map IP entity to VMConnection.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3763d48
Exported file: TI map IP entity to W3CIISLog.json.json
azure-sentinel-canary[bot] Feb 25, 2023
afef251
Exported file: TI map IP entity to WireData.json.json
azure-sentinel-canary[bot] Feb 25, 2023
cfbce82
Exported file: TI map URL entity to AuditLogs.json.json
azure-sentinel-canary[bot] Feb 25, 2023
c2a447e
Exported file: TI map URL entity to OfficeActivity data.json.json
azure-sentinel-canary[bot] Feb 25, 2023
65e5c73
Exported file: TI map URL entity to PaloAlto data.json.json
azure-sentinel-canary[bot] Feb 25, 2023
a2e5f6b
Exported file: TI map URL entity to SecurityAlert data.json.json
azure-sentinel-canary[bot] Feb 25, 2023
80caf91
Exported file: TI map URL entity to Syslog data.json.json
azure-sentinel-canary[bot] Feb 25, 2023
581898f
Exported file: Threats detected by Eset.json.json
azure-sentinel-canary[bot] Feb 25, 2023
856a62c
Exported file: Time series anomaly detection for total volume of traf…
azure-sentinel-canary[bot] Feb 25, 2023
9adb47c
Exported file: Time series anomaly for data size transferred to publi…
azure-sentinel-canary[bot] Feb 25, 2023
4d25e1d
Exported file: Trust Monitor Event.json.json
azure-sentinel-canary[bot] Feb 25, 2023
3a76cba
Exported file: User Accessed Suspicious URL Categories.json.json
azure-sentinel-canary[bot] Feb 25, 2023
b27adce
Exported file: User Accounts - Sign in Failure due to CA Spikes.json.…
azure-sentinel-canary[bot] Feb 25, 2023
25f652f
Exported file: User Assigned Privileged Role.json.json
azure-sentinel-canary[bot] Feb 25, 2023
e5a9c0b
Exported file: User Login from Different Countries within 3 hours.jso…
azure-sentinel-canary[bot] Feb 25, 2023
4f19d1b
Exported file: User account added to built in domain local or global …
azure-sentinel-canary[bot] Feb 25, 2023
5293ad3
Exported file: User account created and deleted within 10 mins.json.json
azure-sentinel-canary[bot] Feb 25, 2023
7247003
Exported file: User account enabled and disabled within 10 mins.json.…
azure-sentinel-canary[bot] Feb 25, 2023
2fcbc7b
Exported file: User added to Azure Active Directory Privileged Groups…
azure-sentinel-canary[bot] Feb 25, 2023
de79fe6
Exported file: User agent search for log4j exploitation attempt.json.…
azure-sentinel-canary[bot] Feb 25, 2023
35c3557
Exported file: User joining Zoom meeting from suspicious timezone.jso…
azure-sentinel-canary[bot] Feb 25, 2023
3ca8ba9
Exported file: User login from different countries within 3 hours (Us…
azure-sentinel-canary[bot] Feb 25, 2023
58e8fcd
Exported file: Users searching for VIP user activity.json.json
azure-sentinel-canary[bot] Feb 25, 2023
5f84fcc
Exported file: Valid Analytic Rule 1.json.json
azure-sentinel-canary[bot] Feb 25, 2023
b317ee7
Exported file: Vectra AI Detect - Detections with High Severity.json.…
azure-sentinel-canary[bot] Feb 25, 2023
f481ed6
Exported file: Vectra AI Detect - New Campaign Detected.json.json
azure-sentinel-canary[bot] Feb 25, 2023
cd54b11
Exported file: Vectra AI Detect - Suspected Compromised Account.json.…
azure-sentinel-canary[bot] Feb 25, 2023
a98a06f
Exported file: Vectra AI Detect - Suspected Compromised Host.json.json
azure-sentinel-canary[bot] Feb 25, 2023
2c2df6c
Exported file: Vectra AI Detect - Suspicious Behaviors.json.json
azure-sentinel-canary[bot] Feb 25, 2023
abcca43
Exported file: Vulnerable Machines related to OMIGOD CVE-2021-38647.j…
azure-sentinel-canary[bot] Feb 25, 2023
2f397f0
Exported file: Vulnerable Machines related to log4j CVE-2021-44228.js…
azure-sentinel-canary[bot] Feb 25, 2023
e64a33e
Exported file: Wazuh - Large Number of Web errors from an IP.json.json
azure-sentinel-canary[bot] Feb 25, 2023
bf38aef
Exported file: Web sites blocked by Eset.json.json
azure-sentinel-canary[bot] Feb 25, 2023
9e569fa
Exported file: Zoom E2E Encryption Disabled.json.json
azure-sentinel-canary[bot] Feb 25, 2023
8750573
Exported file: new file added -- 2_14_2013.json.json
azure-sentinel-canary[bot] Feb 25, 2023
8efe1a5
Exported file: new test rule 1.json.json
azure-sentinel-canary[bot] Feb 25, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "ThreatIntelligence",
"apiVersion": "2022-09-01-preview",
"properties": {
"alertRuleTemplateName": "0dd422ee-e6af-4204-b219-f59ac172e4c6",
"severity": "Medium",
"tactics": [
"Persistence",
"LateralMovement"
],
"techniques": [],
"displayName": "(Preview) Microsoft Threat Intelligence Analytics",
"enabled": true,
"description": "This rule generates an alert when a Microsoft Threat Intelligence Indicator gets matched with your event logs. The alerts are very high fidelity and are turned ON by default. \n\nNote : It is advised to turn off any custom alert rules which match the threat intelligence indicators with the same event logs matched by this analytics to prevent duplicate alerts."
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/516cc0be-cc97-486b-928e-0e222352ba46')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/516cc0be-cc97-486b-928e-0e222352ba46')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet DomainTIs= ThreatIntelligenceIndicator\n | where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n // Picking up only IOC's that contain the entities we want\n | where isnotempty(DomainName)\n | where Active == true\n | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId;\nlet Domains= toscalar(DomainTIs | where isnotempty(DomainName) |summarize make_set(DomainName));\nDomainTIs\n | join (\n imDns(starttime=ago(dt_lookBack), domain_has_any=(Domains))\n | extend DNS_TimeGenerated = TimeGenerated\n) on $left.DomainName==$right.DnsQuery\n| where DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, Url, DNS_TimeGenerated, Dvc, SrcIpAddr, DnsQuery, QueryType\n| extend timestamp = DNS_TimeGenerated, HostCustomEntity = Dvc, IPCustomEntity = SrcIpAddr, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map Domain entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any Domain IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "999e9f5d-db4a-4b07-a206-29c4e667b7e8"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet IP_TI = (ThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n// As there is potentially more than 1 indicator type for matching IP, taking NetworkIP first, then others if that is empty.\n// Taking the first non-empty value based on potential IOC match availability\n| extend TI_ipEntity = coalesce(NetworkIP, NetworkDestinationIP, NetworkSourceIP,EmailSourceIpAddress,\"\")\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId);\nlet TI_IP_List=IP_TI | summarize make_set( TI_ipEntity);\nimDns(starttime=ago(dt_lookBack), response_has_any_prefix=todynamic(toscalar(TI_IP_List)))\n | extend tilist = toscalar(TI_IP_List)\n | mv-expand tilist\n | extend SingleIP=tostring(tilist)\n | project-away tilist\n | where has_ipv4(DnsResponseName, SingleIP)\n | extend DNS_TimeGenerated = TimeGenerated\n| join IP_TI\n on $left.SingleIP == $right.TI_ipEntity\n| where DNS_TimeGenerated >= TimeGenerated and DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore, DNS_TimeGenerated,\nTI_ipEntity, Dvc, EventId, SubType, SrcIpAddr, DnsQuery, DnsResponseName, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress\n| extend timestamp = DNS_TimeGenerated, IPCustomEntity = TI_ipEntity, HostCustomEntity = Dvc, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map IP entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any IP IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "67775878-7f8b-4380-ac54-115e1e828901"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT6H",
"queryPeriod": "PT7H",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "SingleAlert"
},
"severity": "High",
"query": "// Rule Name - (Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations\r\n// Rule Description - Sensitive Data Access Outside Organziational Geolocations\r\n// Prerequisite 1: Onboard Azure Infomation Protection (https://docs.microsoft.com/en-us/azure/information-protection/requirements)\r\n// Prerequisite 2: Install AIP Unified Labeling Scanner (https://docs.microsoft.com/en-us/azure/information-protection/tutorial-install-scanner)\r\n// Prerequisite 3: Enable Azure Information Protection Connector (https://docs.microsoft.com/en-us/azure/sentinel/data-connectors-reference#azure-information-protection)\r\n// Prerequisite 4: Enable Azure Active Directory Connector (hhttps://docs.microsoft.com/en-us/azure/sentinel/connect-azure-active-directory)\r\nInformationProtectionLogs_CL\r\n| extend UserPrincipalName = UserId_s\r\n| where LabelName_s <> \"\"\r\n| join (SigninLogs) on UserPrincipalName\r\n| extend City = tostring(LocationDetails.city)\r\n// | where City <> \"New York\" // Configure Location Details within Organizational Requirements\r\n| extend State = tostring(LocationDetails.state)\r\n// | where State <> \"Texas\" // Configure Location Details within Organizational Requirements\r\n| extend Country_Region = tostring(LocationDetails.countryOrRegion)\r\n// | where Country_Region <> \"US\" // Configure Location Details within Organizational Requirements\r\n| summarize count() by UserPrincipalName, LabelName_s, Activity_s, City, State, Country_Region\r\n| sort by count_ desc\r\n| limit 250",
"suppressionDuration": "PT5H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5H",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": [],
"groupByCustomDetails": []
}
},
"customDetails": {
"Activity": "Activity_s",
"Where": "City"
},
"entityMappings": [
{
"entityType": "Account",
"fieldMappings": [
{
"identifier": "AadUserId",
"columnName": "UserPrincipalName"
}
]
}
],
"tactics": [],
"techniques": null,
"displayName": "(Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations",
"enabled": false,
"description": "Sensitive Data Access Outside Organziational Geolocations",
"alertRuleTemplateName": null
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT10M",
"queryPeriod": "PT10M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let default_file_ext_blocklist = dynamic(['.ps1', '.vbs', '.bat', '.scr']);\nlet custom_file_ext_blocklist=toscalar(_GetWatchlist('RiskyFileTypes') | extend Extension=column_ifexists(\"Extension\",\"\") | where isnotempty(Extension) | summarize make_set(Extension));\nlet file_ext_blocklist = array_concat(default_file_ext_blocklist, custom_file_ext_blocklist);\nimWebSession(url_has_any=file_ext_blocklist, eventresult='Success')\n| extend requestedFileName=tostring(split(tostring(parse_url(Url)[\"Path\"]),'/')[-1])\n| extend requestedFileExt=extract(@(\\.\\w+)$,1,requestedFileName, typeof(string))\n| where requestedFileExtension in (file_ext_blocklist)\n| summarize LastAttemptTime=max(TimeGenerated), NumFailedAttempts=count() by SrcIpAddr, requestedFileName, Url\n| extend IPCustomEntity = SrcIpAddr, UrlCustomEntity=Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"InitialAccess"
],
"techniques": null,
"displayName": "A client made a web request to a potentially harmful file (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request to a URL that holds a file type, including .ps1, .bat, .vbs, and .scr that can be harmful if downloaded. This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, deploy the Advanced SIEM information Model (ASIM).\nTo use this analytics rule, deploy the [Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM)",
"alertRuleTemplateName": "09c49590-4e9d-4da9-a34d-17222d0c9e7e"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT15M",
"queryPeriod": "PT15M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let threatCategory=\"Powershell\";\nlet knownUserAgentsIndicators = materialize(externaldata(UserAgent:string, Category:string)\n [ @\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/UnusualUserAgents.csv\"] \n with(format=\"csv\", ignoreFirstRecord=True));\nlet knownUserAgents=toscalar(knownUserAgentsIndicators | where Category==threatCategory | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet customUserAgents=toscalar(_GetWatchlist(\"UnusualUserAgents\") | where SearchKey==threatCategory | extend UserAgent=column_ifexists(\"UserAgent\",\"\") | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet fullUAList = array_concat(knownUserAgents,customUserAgents);\nimWebSession(httpuseragent_has_any=fullUAList)\n| project SrcIpAddr, Url, TimeGenerated,HttpUserAgent, SrcUsername\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"CommandAndControl",
"DefenseEvasion"
],
"techniques": null,
"displayName": "A host is potentially running PowerShell to send HTTP(S) requests (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request with a user agent header known to belong PowerShell. <br>You can add custom Powershell indicating User-Agent headers using a watchlist, for more information refer to the [UnusualUserAgents Watchlist](https://aka.ms/ASimUnusualUserAgentsWatchlist).<br><br>This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, [deploy the Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM).",
"alertRuleTemplateName": "42436753-9944-4d70-801c-daaa4d19ddd2"
}
}
]
}
Loading