Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
375 commits
Select commit Hold shift + click to select a range
bd3382f
Exported file: Dev-0228 File Path Hashes November 2021 - ASIM.json.json
azure-sentinel-canary[bot] Feb 26, 2023
ccf347d
Exported file: Dev-0228 File Path Hashes November 2021.json.json
azure-sentinel-canary[bot] Feb 26, 2023
36c5172
Exported file: Distributed Password cracking attempts in AzureAD.json…
azure-sentinel-canary[bot] Feb 26, 2023
c0546be
Exported file: Duplicate Rule DisplayName 1 (1).json.json
azure-sentinel-canary[bot] Feb 26, 2023
db57f70
Exported file: Duplicate Rule DisplayName 1.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d306b7c
Exported file: Email access via active sync.json.json
azure-sentinel-canary[bot] Feb 26, 2023
91002d1
Exported file: Excessive Amount of Denied Connections from a Single S…
azure-sentinel-canary[bot] Feb 26, 2023
545ef5f
Exported file: Excessive Denied Proxy Traffic.json.json
azure-sentinel-canary[bot] Feb 26, 2023
29fae42
Exported file: Excessive Failed Authentication from Invalid Inputs.js…
azure-sentinel-canary[bot] Feb 26, 2023
85a7483
Exported file: Excessive NXDOMAIN DNS Queries (Normalized DNS).json.json
azure-sentinel-canary[bot] Feb 26, 2023
36a3bbc
Exported file: Excessive NXDOMAIN DNS Queries.json.json
azure-sentinel-canary[bot] Feb 26, 2023
bc0287d
Exported file: Excessive Windows logon failures.json.json
azure-sentinel-canary[bot] Feb 26, 2023
fe9adce
Exported file: Excessive number of failed connections from a single s…
azure-sentinel-canary[bot] Feb 26, 2023
921df5e
Exported file: Exchange AuditLog disabled.json.json
azure-sentinel-canary[bot] Feb 26, 2023
f9a3fca
Exported file: Exchange OAB Virtual Directory Attribute Containing Po…
azure-sentinel-canary[bot] Feb 26, 2023
939d1f3
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection (1).…
azure-sentinel-canary[bot] Feb 26, 2023
5569a0c
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection.json…
azure-sentinel-canary[bot] Feb 26, 2023
1b7f215
Exported file: Exchange Server Vulnerabilities Disclosed March 2021 I…
azure-sentinel-canary[bot] Feb 26, 2023
42b57b6
Exported file: Exchange workflow MailItemsAccessed operation anomaly.…
azure-sentinel-canary[bot] Feb 26, 2023
dfb8af1
Exported file: Explicit MFA Deny.json.json
azure-sentinel-canary[bot] Feb 26, 2023
ac04c45
Exported file: External Upstream Source Added to Azure DevOps Feed.js…
azure-sentinel-canary[bot] Feb 26, 2023
792516a
Exported file: External User Access Enabled.json.json
azure-sentinel-canary[bot] Feb 26, 2023
af4d8d3
Exported file: External guest invitations by default guest followed b…
azure-sentinel-canary[bot] Feb 26, 2023
227e814
Exported file: External user added and removed in short timeframe.jso…
azure-sentinel-canary[bot] Feb 26, 2023
d9545e9
Exported file: Failed AWS Console logons but success logon to AzureAD…
azure-sentinel-canary[bot] Feb 26, 2023
763c496
Exported file: Failed AzureAD logons but success logon to AWS Console…
azure-sentinel-canary[bot] Feb 26, 2023
eed4335
Exported file: Failed AzureAD logons but success logon to host.json.json
azure-sentinel-canary[bot] Feb 26, 2023
eee75f4
Exported file: Failed Logins from Unknown or Invalid User.json.json
azure-sentinel-canary[bot] Feb 26, 2023
b26ca6f
Exported file: Failed host logons but success logon to AzureAD.json.json
azure-sentinel-canary[bot] Feb 26, 2023
c3a14a5
Exported file: Failed login attempts to Azure Portal.json.json
azure-sentinel-canary[bot] Feb 26, 2023
2660371
Exported file: Failed logon attempts by valid accounts within 10 mins…
azure-sentinel-canary[bot] Feb 26, 2023
dde330f
Exported file: Failed logon attempts in authpriv.json.json
azure-sentinel-canary[bot] Feb 26, 2023
1ba3a79
Exported file: First access credential added to Application or Servic…
azure-sentinel-canary[bot] Feb 26, 2023
9b8c8c5
Exported file: Fortinet - Beacon pattern detected.json.json
azure-sentinel-canary[bot] Feb 26, 2023
907f638
Exported file: Full Admin policy created and then attached to Roles, …
azure-sentinel-canary[bot] Feb 26, 2023
a5b3f80
Exported file: Gain Code Execution on ADFS Server via Remote WMI Exec…
azure-sentinel-canary[bot] Feb 26, 2023
34202c8
Exported file: Gain Code Execution on ADFS Server via SMB + Remote Se…
azure-sentinel-canary[bot] Feb 26, 2023
9d692bc
Exported file: GitHub Activites from a New Country.json.json
azure-sentinel-canary[bot] Feb 26, 2023
b5daa24
Exported file: GitHub Security Vulnerability in Repository.json.json
azure-sentinel-canary[bot] Feb 26, 2023
73cb3fc
Exported file: GitHub Signin Burst from Multiple Locations.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d440613
Exported file: GitHub Two Factor Auth Disable.json.json
azure-sentinel-canary[bot] Feb 26, 2023
12888ad
Exported file: Group created then added to built in domain local or g…
azure-sentinel-canary[bot] Feb 26, 2023
eb7f4ac
Exported file: HAFNIUM New UM Service Child Process.json.json
azure-sentinel-canary[bot] Feb 26, 2023
31a536b
Exported file: HAFNIUM Suspicious Exchange Request.json.json
azure-sentinel-canary[bot] Feb 26, 2023
bfec3e9
Exported file: HAFNIUM Suspicious File Downloads_.json.json
azure-sentinel-canary[bot] Feb 26, 2023
8a229fc
Exported file: HAFNIUM Suspicious UM Service Error.json.json
azure-sentinel-canary[bot] Feb 26, 2023
35c26e3
Exported file: HAFNIUM UM Service writing suspicious file.json.json
azure-sentinel-canary[bot] Feb 26, 2023
2a9779f
Exported file: High Number of Urgent Vulnerabilities Detected (1).jso…
azure-sentinel-canary[bot] Feb 26, 2023
ac93e65
Exported file: High Number of Urgent Vulnerabilities Detected.json.json
azure-sentinel-canary[bot] Feb 26, 2023
4c22cd7
Exported file: High Urgency Cyberpion Action Items.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d37a8b1
Exported file: High count of connections by client IP on many ports.j…
azure-sentinel-canary[bot] Feb 26, 2023
9fa7879
Exported file: High count of failed attempts from same client IP.json…
azure-sentinel-canary[bot] Feb 26, 2023
78282ec
Exported file: High count of failed logons by a user.json.json
azure-sentinel-canary[bot] Feb 26, 2023
c0b23c8
Exported file: IP with multiple failed Azure AD logins successfully l…
azure-sentinel-canary[bot] Feb 26, 2023
c15ea15
Exported file: Known Barium IP.json.json
azure-sentinel-canary[bot] Feb 26, 2023
5415508
Exported file: Known Barium domains.json.json
azure-sentinel-canary[bot] Feb 26, 2023
b05d5e1
Exported file: Known CERIUM domains and hashes.json.json
azure-sentinel-canary[bot] Feb 26, 2023
a20fb47
Exported file: Known GALLIUM domains and hashes.json.json
azure-sentinel-canary[bot] Feb 26, 2023
1fafa17
Exported file: Known IRIDIUM IP.json.json
azure-sentinel-canary[bot] Feb 26, 2023
e2f7320
Exported file: Known Malware Detected.json.json
azure-sentinel-canary[bot] Feb 26, 2023
62e356a
Exported file: Known Manganese IP and UserAgent activity.json.json
azure-sentinel-canary[bot] Feb 26, 2023
ccd68cf
Exported file: Known NICKEL domains and hashes.json.json
azure-sentinel-canary[bot] Feb 26, 2023
7b5c828
Exported file: Known PHOSPHORUS group domains_IP - October 2020.json.…
azure-sentinel-canary[bot] Feb 26, 2023
aae70d2
Exported file: Known Phosphorus group domains_IP.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d27f1db
Exported file: Known STRONTIUM group domains - July 2019.json.json
azure-sentinel-canary[bot] Feb 26, 2023
099fa4d
Exported file: Known ZINC Comebacker and Klackring malware hashes.jso…
azure-sentinel-canary[bot] Feb 26, 2023
ad15f63
Exported file: Known ZINC related maldoc hash.json.json
azure-sentinel-canary[bot] Feb 26, 2023
5fea9f6
Exported file: Linked Malicious Storage Artifacts.json.json
azure-sentinel-canary[bot] Feb 26, 2023
9b80b80
Exported file: Log4j vulnerability exploit aka Log4Shell IP IOC.json.…
azure-sentinel-canary[bot] Feb 26, 2023
cd8b382
Exported file: Login to AWS Management Console without MFA.json.json
azure-sentinel-canary[bot] Feb 26, 2023
5faa2b1
Exported file: MFA Rejected by User.json.json
azure-sentinel-canary[bot] Feb 26, 2023
9b71a0d
Exported file: MFA disabled for a user.json.json
azure-sentinel-canary[bot] Feb 26, 2023
4e3e485
Exported file: MSHTML vulnerability CVE-2021-40444 attack.json.json
azure-sentinel-canary[bot] Feb 26, 2023
ab4fa6a
Exported file: Mail redirect via ExO transport rule.json.json
azure-sentinel-canary[bot] Feb 26, 2023
edbc33e
Exported file: Mail.Read Permissions Granted to Application.json.json
azure-sentinel-canary[bot] Feb 26, 2023
c4be297
Exported file: Malformed user agent.json.json
azure-sentinel-canary[bot] Feb 26, 2023
8c0b527
Exported file: Malicious Inbox Rule.json.json
azure-sentinel-canary[bot] Feb 26, 2023
45c274a
Exported file: Malicious web application requests linked with Microso…
azure-sentinel-canary[bot] Feb 26, 2023
385b7ae
Exported file: Malware in the recycle bin (Normalized Process Events)…
azure-sentinel-canary[bot] Feb 26, 2023
a12b883
Exported file: Malware in the recycle bin.json.json
azure-sentinel-canary[bot] Feb 26, 2023
53d8cc6
Exported file: Mass secret retrieval from Azure Key Vault.json.json
azure-sentinel-canary[bot] Feb 26, 2023
2cd1c4d
Exported file: Microsoft COVID-19 file hash indicator matches.json.json
azure-sentinel-canary[bot] Feb 26, 2023
7ce82c1
Exported file: Modified domain federation trust settings.json.json
azure-sentinel-canary[bot] Feb 26, 2023
4db5bc6
Exported file: Monitor AWS Credential abuse or hijacking.json.json
azure-sentinel-canary[bot] Feb 26, 2023
58f958b
Exported file: Multiple Password Reset by user.json.json
azure-sentinel-canary[bot] Feb 26, 2023
02e6016
Exported file: Multiple RDP connections from Single System.json.json
azure-sentinel-canary[bot] Feb 26, 2023
676386b
Exported file: Multiple Teams deleted by a single user.json.json
azure-sentinel-canary[bot] Feb 26, 2023
15fd995
Exported file: Multiple users email forwarded to same destination.jso…
azure-sentinel-canary[bot] Feb 26, 2023
77b1f5e
Exported file: NOBELIUM - Domain and IP IOCs - March 2021.json.json
azure-sentinel-canary[bot] Feb 26, 2023
7726fb7
Exported file: NOBELIUM - Domain, Hash and IP IOCs - May 2021.json.json
azure-sentinel-canary[bot] Feb 26, 2023
93e5932
Exported file: NOBELIUM - Script payload stored in Registry.json.json
azure-sentinel-canary[bot] Feb 26, 2023
537e5a6
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Feb 26, 2023
9208a8c
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Feb 26, 2023
f3649a4
Exported file: NOBELIUM IOCs related to FoggyWeb backdoor.json.json
azure-sentinel-canary[bot] Feb 26, 2023
f11358e
Exported file: Network endpoint to host executable correlation.json.json
azure-sentinel-canary[bot] Feb 26, 2023
65a9b37
Exported file: New Agent Added to Pool by New User or Added to a New …
azure-sentinel-canary[bot] Feb 26, 2023
a5c7fae
Exported file: New CloudShell User.json.json
azure-sentinel-canary[bot] Feb 26, 2023
c947b3d
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Feb 26, 2023
5120985
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Feb 26, 2023
923bda1
Exported file: New PA, PCA, or PCAS added to Azure DevOps.json.json
azure-sentinel-canary[bot] Feb 26, 2023
413b814
Exported file: New UserAgent observed in last 24 hours.json.json
azure-sentinel-canary[bot] Feb 26, 2023
890247c
Exported file: New access credential added to Application or Service …
azure-sentinel-canary[bot] Feb 26, 2023
f846c3c
Exported file: New executable via Office FileUploaded Operation.json.…
azure-sentinel-canary[bot] Feb 26, 2023
66e1ed8
Exported file: New internet-exposed SSH endpoints.json.json
azure-sentinel-canary[bot] Feb 26, 2023
31c30bf
Exported file: New user created and added to the built-in administrat…
azure-sentinel-canary[bot] Feb 26, 2023
b11ef32
Exported file: Non Domain Controller Active Directory Replication.jso…
azure-sentinel-canary[bot] Feb 26, 2023
dfeb574
Exported file: OMI Vulnerability Exploitation.json.json
azure-sentinel-canary[bot] Feb 26, 2023
515731b
Exported file: Office policy tampering.json.json
azure-sentinel-canary[bot] Feb 26, 2023
8abc320
Exported file: PIM Elevation Request Rejected.json.json
azure-sentinel-canary[bot] Feb 26, 2023
7057bd4
Exported file: Palo Alto - possible internal to external port scannin…
azure-sentinel-canary[bot] Feb 26, 2023
fb92600
Exported file: Palo Alto - potential beaconing detected.json.json
azure-sentinel-canary[bot] Feb 26, 2023
8b62df8
Exported file: Password spray attack against Azure AD application.jso…
azure-sentinel-canary[bot] Feb 26, 2023
97b5f02
Exported file: Port Scan Detected.json.json
azure-sentinel-canary[bot] Feb 26, 2023
6872330
Exported file: Possible STRONTIUM attempted credential harvesting - O…
azure-sentinel-canary[bot] Feb 26, 2023
d7a7337
Exported file: Possible STRONTIUM attempted credential harvesting - S…
azure-sentinel-canary[bot] Feb 26, 2023
82598fd
Exported file: Possible contact with a domain generated by a DGA.json…
azure-sentinel-canary[bot] Feb 26, 2023
9437fa6
Exported file: Potential Build Process Compromise - MDE.json.json
azure-sentinel-canary[bot] Feb 26, 2023
73dc819
Exported file: Potential Build Process Compromise.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d88b0d9
Exported file: Potential DGA detected (ASimDNS).json.json
azure-sentinel-canary[bot] Feb 26, 2023
8928407
Exported file: Potential DGA detected.json.json
azure-sentinel-canary[bot] Feb 26, 2023
601f287
Exported file: Potential DHCP Starvation Attack.json.json
azure-sentinel-canary[bot] Feb 26, 2023
17ceef3
Exported file: Potential Kerberoasting.json.json
azure-sentinel-canary[bot] Feb 26, 2023
797a577
Exported file: Potential Password Spray Attack (Uses Authentication N…
azure-sentinel-canary[bot] Feb 26, 2023
540fecc
Exported file: Potential Password Spray Attack.json.json
azure-sentinel-canary[bot] Feb 26, 2023
7556cfe
Exported file: Powershell Empire cmdlets seen in command line.json.json
azure-sentinel-canary[bot] Feb 26, 2023
fd9763c
Exported file: Privileged Accounts - Sign in Failure Spikes.json.json
azure-sentinel-canary[bot] Feb 26, 2023
8032ef7
Exported file: Privileged Role Assigned Outside PIM.json.json
azure-sentinel-canary[bot] Feb 26, 2023
641c787
Exported file: Probable AdFind Recon Tool Usage (Normalized Process E…
azure-sentinel-canary[bot] Feb 26, 2023
71f4f21
Exported file: Probable AdFind Recon Tool Usage.json.json
azure-sentinel-canary[bot] Feb 26, 2023
26e06d7
Exported file: Process executed from binary hidden in Base64 encoded …
azure-sentinel-canary[bot] Feb 26, 2023
e0144a0
Exported file: Process execution frequency anomaly.json.json
azure-sentinel-canary[bot] Feb 26, 2023
3fa6b66
Exported file: ProofpointPOD - Binary file in attachment.json.json
azure-sentinel-canary[bot] Feb 26, 2023
8dff66d
Exported file: ProofpointPOD - Email sender IP in TI list.json.json
azure-sentinel-canary[bot] Feb 26, 2023
cbabd77
Exported file: ProofpointPOD - Email sender in TI list.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d0f935f
Exported file: ProofpointPOD - High risk message not discarded.json.json
azure-sentinel-canary[bot] Feb 26, 2023
c25003b
Exported file: ProofpointPOD - Multiple archived attachments to the s…
azure-sentinel-canary[bot] Feb 26, 2023
3695d68
Exported file: ProofpointPOD - Multiple large emails to the same reci…
azure-sentinel-canary[bot] Feb 26, 2023
fe9a005
Exported file: ProofpointPOD - Multiple protected emails to unknown r…
azure-sentinel-canary[bot] Feb 26, 2023
d47d048
Exported file: ProofpointPOD - Possible data exfiltration to private …
azure-sentinel-canary[bot] Feb 26, 2023
6ac4a28
Exported file: ProofpointPOD - Suspicious attachment.json.json
azure-sentinel-canary[bot] Feb 26, 2023
524d314
Exported file: ProofpointPOD - Weak ciphers.json.json
azure-sentinel-canary[bot] Feb 26, 2023
a0dfd9a
Exported file: PulseConnectSecure - Large Number of Distinct Failed U…
azure-sentinel-canary[bot] Feb 26, 2023
c3c01b1
Exported file: PulseConnectSecure - Potential Brute Force Attempts.js…
azure-sentinel-canary[bot] Feb 26, 2023
1533472
Exported file: RDP Nesting.json.json
azure-sentinel-canary[bot] Feb 26, 2023
0032a8c
Exported file: Rare RDP Connections.json.json
azure-sentinel-canary[bot] Feb 26, 2023
63ca0fa
Exported file: Rare and potentially high-risk Office operations.json.…
azure-sentinel-canary[bot] Feb 26, 2023
0ced5a9
Exported file: Rare application consent.json.json
azure-sentinel-canary[bot] Feb 26, 2023
6609abc
Exported file: Rare client observed with high reverse DNS lookup coun…
azure-sentinel-canary[bot] Feb 26, 2023
5c77582
Exported file: Rare subscription-level operations in Azure.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d430c03
Exported file: Request for single resource on domain.json.json
azure-sentinel-canary[bot] Feb 26, 2023
3299fd4
Exported file: SOURGUM Actor IOC - July 2021.json.json
azure-sentinel-canary[bot] Feb 26, 2023
848c925
Exported file: SSH - Potential Brute Force.json.json
azure-sentinel-canary[bot] Feb 26, 2023
9f173a0
Exported file: SUNBURST and SUPERNOVA backdoor hashes (Normalized Fil…
azure-sentinel-canary[bot] Feb 26, 2023
7c2a3aa
Exported file: SUNBURST and SUPERNOVA backdoor hashes.json.json
azure-sentinel-canary[bot] Feb 26, 2023
bc77c26
Exported file: SUNBURST network beacons.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d79ae46
Exported file: SUNBURST suspicious SolarWinds child processes (Normal…
azure-sentinel-canary[bot] Feb 26, 2023
3798f68
Exported file: SUNBURST suspicious SolarWinds child processes.json.json
azure-sentinel-canary[bot] Feb 26, 2023
69fdd6b
Exported file: SUNSPOT log file creation.json.json
azure-sentinel-canary[bot] Feb 26, 2023
b7f5101
Exported file: SUNSPOT malware hashes.json.json
azure-sentinel-canary[bot] Feb 26, 2023
2e3f8d1
Exported file: SUPERNOVA webshell.json.json
azure-sentinel-canary[bot] Feb 26, 2023
27d083e
Exported file: Security Event log cleared.json.json
azure-sentinel-canary[bot] Feb 26, 2023
f0765d2
Exported file: Security Service Registry ACL Modification.json.json
azure-sentinel-canary[bot] Feb 26, 2023
0fb66ba
Exported file: SecurityEvent - Multiple authentication failures follo…
azure-sentinel-canary[bot] Feb 26, 2023
d0374b2
Exported file: Sensitive Azure Key Vault operations.json.json
azure-sentinel-canary[bot] Feb 26, 2023
aa6d2b8
Exported file: Several deny actions registered.json.json
azure-sentinel-canary[bot] Feb 26, 2023
9891316
Exported file: SharePointFileOperation via devices with previously un…
azure-sentinel-canary[bot] Feb 26, 2023
ed57b9d
Exported file: SharePointFileOperation via previously unseen IPs.json…
azure-sentinel-canary[bot] Feb 26, 2023
5bb7f76
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Feb 26, 2023
f24ca48
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Feb 26, 2023
99d73df
Exported file: Solorigate Defender Detections.json.json
azure-sentinel-canary[bot] Feb 26, 2023
ff89611
Exported file: Solorigate Domains Found in VM Insights.json.json
azure-sentinel-canary[bot] Feb 26, 2023
b88136b
Exported file: Solorigate Named Pipe.json.json
azure-sentinel-canary[bot] Feb 26, 2023
4540010
Exported file: Solorigate Network Beacon.json.json
azure-sentinel-canary[bot] Feb 26, 2023
392180e
Exported file: Squid proxy events for ToR proxies.json.json
azure-sentinel-canary[bot] Feb 26, 2023
505d91d
Exported file: Squid proxy events related to mining pools.json.json
azure-sentinel-canary[bot] Feb 26, 2023
caa8204
Exported file: Starting or Stopping HealthService to Avoid Detection.…
azure-sentinel-canary[bot] Feb 26, 2023
09e827f
Exported file: Successful SSH brute force attack.json.json
azure-sentinel-canary[bot] Feb 26, 2023
f9a3f6e
Exported file: Successful logon from IP and failure from a different …
azure-sentinel-canary[bot] Feb 26, 2023
38fdf39
Exported file: Suspicious Resource deployment.json.json
azure-sentinel-canary[bot] Feb 26, 2023
59260dd
Exported file: Suspicious Service Principal creation activity.json.json
azure-sentinel-canary[bot] Feb 26, 2023
cdf9467
Exported file: Suspicious application consent for offline access.json…
azure-sentinel-canary[bot] Feb 26, 2023
fce4177
Exported file: Suspicious application consent similar to O365 Attack …
azure-sentinel-canary[bot] Feb 26, 2023
1abb58e
Exported file: Suspicious application consent similar to PwnAuth.json…
azure-sentinel-canary[bot] Feb 26, 2023
00365bf
Exported file: Suspicious granting of permissions to an account.json.…
azure-sentinel-canary[bot] Feb 26, 2023
596e146
Exported file: Suspicious link sharing pattern.json.json
azure-sentinel-canary[bot] Feb 26, 2023
cdb194c
Exported file: Suspicious number of resource creation or deployment a…
azure-sentinel-canary[bot] Feb 26, 2023
da96096
Exported file: TEARDROP memory-only dropper.json.json
azure-sentinel-canary[bot] Feb 26, 2023
52aee58
Exported file: THALLIUM domains included in DCU takedown.json.json
azure-sentinel-canary[bot] Feb 26, 2023
3f446e7
Exported file: TI map Domain entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Feb 26, 2023
ff7917a
Exported file: TI map Domain entity to DnsEvent.json.json
azure-sentinel-canary[bot] Feb 26, 2023
86ee5fb
Exported file: TI map Domain entity to PaloAlto.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d542cbd
Exported file: TI map Domain entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Feb 26, 2023
6324bac
Exported file: TI map Domain entity to Syslog.json.json
azure-sentinel-canary[bot] Feb 26, 2023
4a31ea2
Exported file: TI map Email entity to AzureActivity.json.json
azure-sentinel-canary[bot] Feb 26, 2023
31aba98
Exported file: TI map Email entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Feb 26, 2023
83c62a0
Exported file: TI map Email entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Feb 26, 2023
7eb8cf1
Exported file: TI map Email entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Feb 26, 2023
67700ac
Exported file: TI map Email entity to SecurityEvent.json.json
azure-sentinel-canary[bot] Feb 26, 2023
bd3c8de
Exported file: TI map Email entity to SigninLogs.json.json
azure-sentinel-canary[bot] Feb 26, 2023
f77850e
Exported file: TI map File Hash to CommonSecurityLog Event.json.json
azure-sentinel-canary[bot] Feb 26, 2023
7434380
Exported file: TI map File Hash to Security Event.json.json
azure-sentinel-canary[bot] Feb 26, 2023
71357dd
Exported file: TI map IP entity to AWSCloudTrail.json.json
azure-sentinel-canary[bot] Feb 26, 2023
2be75bb
Exported file: TI map IP entity to AppServiceHTTPLogs.json.json
azure-sentinel-canary[bot] Feb 26, 2023
e65cb3b
Exported file: TI map IP entity to Azure Key Vault logs.json.json
azure-sentinel-canary[bot] Feb 26, 2023
d4eae2d
Exported file: TI map IP entity to Azure SQL Security Audit Events.js…
azure-sentinel-canary[bot] Feb 26, 2023
2bf8673
Exported file: TI map IP entity to AzureActivity.json.json
azure-sentinel-canary[bot] Feb 26, 2023
3a52e86
Exported file: TI map IP entity to AzureFirewall.json.json
azure-sentinel-canary[bot] Feb 26, 2023
0d27158
Exported file: TI map IP entity to AzureNetworkAnalytics_CL (NSG Flow…
azure-sentinel-canary[bot] Feb 26, 2023
f23073a
Exported file: TI map IP entity to DnsEvents.json.json
azure-sentinel-canary[bot] Feb 26, 2023
2f8c96d
Exported file: TI map IP entity to Duo Security.json.json
azure-sentinel-canary[bot] Feb 26, 2023
a6782cd
Exported file: TI map IP entity to GitHub_CL.json.json
azure-sentinel-canary[bot] Feb 26, 2023
38df039
Exported file: TI map IP entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Feb 26, 2023
93abd36
Exported file: TI map IP entity to SigninLogs.json.json
azure-sentinel-canary[bot] Feb 26, 2023
43e6721
Exported file: TI map IP entity to VMConnection.json.json
azure-sentinel-canary[bot] Feb 26, 2023
4764ffa
Exported file: TI map IP entity to W3CIISLog.json.json
azure-sentinel-canary[bot] Feb 26, 2023
bc0cbc3
Exported file: TI map IP entity to WireData.json.json
azure-sentinel-canary[bot] Feb 26, 2023
cb7ffb1
Exported file: TI map URL entity to AuditLogs.json.json
azure-sentinel-canary[bot] Feb 26, 2023
5e75df0
Exported file: TI map URL entity to OfficeActivity data.json.json
azure-sentinel-canary[bot] Feb 26, 2023
1293a2d
Exported file: TI map URL entity to PaloAlto data.json.json
azure-sentinel-canary[bot] Feb 26, 2023
fbba3b8
Exported file: TI map URL entity to SecurityAlert data.json.json
azure-sentinel-canary[bot] Feb 26, 2023
e836df7
Exported file: TI map URL entity to Syslog data.json.json
azure-sentinel-canary[bot] Feb 26, 2023
3a7b2c1
Exported file: Threats detected by Eset.json.json
azure-sentinel-canary[bot] Feb 26, 2023
6cf5631
Exported file: Time series anomaly detection for total volume of traf…
azure-sentinel-canary[bot] Feb 26, 2023
ae86eda
Exported file: Time series anomaly for data size transferred to publi…
azure-sentinel-canary[bot] Feb 26, 2023
d4fd6a3
Exported file: Trust Monitor Event.json.json
azure-sentinel-canary[bot] Feb 26, 2023
76d4596
Exported file: User Accessed Suspicious URL Categories.json.json
azure-sentinel-canary[bot] Feb 26, 2023
888c8c8
Exported file: User Accounts - Sign in Failure due to CA Spikes.json.…
azure-sentinel-canary[bot] Feb 26, 2023
61f9817
Exported file: User Assigned Privileged Role.json.json
azure-sentinel-canary[bot] Feb 26, 2023
20fed2e
Exported file: User Login from Different Countries within 3 hours.jso…
azure-sentinel-canary[bot] Feb 26, 2023
288fab5
Exported file: User account added to built in domain local or global …
azure-sentinel-canary[bot] Feb 26, 2023
45758f3
Exported file: User account created and deleted within 10 mins.json.json
azure-sentinel-canary[bot] Feb 26, 2023
b15f097
Exported file: User account enabled and disabled within 10 mins.json.…
azure-sentinel-canary[bot] Feb 26, 2023
64a1c2f
Exported file: User added to Azure Active Directory Privileged Groups…
azure-sentinel-canary[bot] Feb 26, 2023
eba4be9
Exported file: User agent search for log4j exploitation attempt.json.…
azure-sentinel-canary[bot] Feb 26, 2023
99db77f
Exported file: User joining Zoom meeting from suspicious timezone.jso…
azure-sentinel-canary[bot] Feb 26, 2023
4244087
Exported file: User login from different countries within 3 hours (Us…
azure-sentinel-canary[bot] Feb 26, 2023
8cba8e6
Exported file: Users searching for VIP user activity.json.json
azure-sentinel-canary[bot] Feb 26, 2023
de84311
Exported file: Valid Analytic Rule 1.json.json
azure-sentinel-canary[bot] Feb 26, 2023
af05864
Exported file: Vectra AI Detect - Detections with High Severity.json.…
azure-sentinel-canary[bot] Feb 26, 2023
53ca1e6
Exported file: Vectra AI Detect - New Campaign Detected.json.json
azure-sentinel-canary[bot] Feb 26, 2023
4b41a4d
Exported file: Vectra AI Detect - Suspected Compromised Account.json.…
azure-sentinel-canary[bot] Feb 26, 2023
abbb73a
Exported file: Vectra AI Detect - Suspected Compromised Host.json.json
azure-sentinel-canary[bot] Feb 26, 2023
a871cee
Exported file: Vectra AI Detect - Suspicious Behaviors.json.json
azure-sentinel-canary[bot] Feb 26, 2023
9e9322a
Exported file: Vulnerable Machines related to OMIGOD CVE-2021-38647.j…
azure-sentinel-canary[bot] Feb 26, 2023
9852598
Exported file: Vulnerable Machines related to log4j CVE-2021-44228.js…
azure-sentinel-canary[bot] Feb 26, 2023
b42385e
Exported file: Wazuh - Large Number of Web errors from an IP.json.json
azure-sentinel-canary[bot] Feb 26, 2023
b99579b
Exported file: Web sites blocked by Eset.json.json
azure-sentinel-canary[bot] Feb 26, 2023
9f27b03
Exported file: Zoom E2E Encryption Disabled.json.json
azure-sentinel-canary[bot] Feb 26, 2023
3a3e819
Exported file: new file added -- 2_14_2013.json.json
azure-sentinel-canary[bot] Feb 26, 2023
e709931
Exported file: new test rule 1.json.json
azure-sentinel-canary[bot] Feb 26, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "ThreatIntelligence",
"apiVersion": "2022-09-01-preview",
"properties": {
"alertRuleTemplateName": "0dd422ee-e6af-4204-b219-f59ac172e4c6",
"severity": "Medium",
"tactics": [
"Persistence",
"LateralMovement"
],
"techniques": [],
"displayName": "(Preview) Microsoft Threat Intelligence Analytics",
"enabled": true,
"description": "This rule generates an alert when a Microsoft Threat Intelligence Indicator gets matched with your event logs. The alerts are very high fidelity and are turned ON by default. \n\nNote : It is advised to turn off any custom alert rules which match the threat intelligence indicators with the same event logs matched by this analytics to prevent duplicate alerts."
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/516cc0be-cc97-486b-928e-0e222352ba46')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/516cc0be-cc97-486b-928e-0e222352ba46')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet DomainTIs= ThreatIntelligenceIndicator\n | where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n // Picking up only IOC's that contain the entities we want\n | where isnotempty(DomainName)\n | where Active == true\n | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId;\nlet Domains= toscalar(DomainTIs | where isnotempty(DomainName) |summarize make_set(DomainName));\nDomainTIs\n | join (\n imDns(starttime=ago(dt_lookBack), domain_has_any=(Domains))\n | extend DNS_TimeGenerated = TimeGenerated\n) on $left.DomainName==$right.DnsQuery\n| where DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, Url, DNS_TimeGenerated, Dvc, SrcIpAddr, DnsQuery, QueryType\n| extend timestamp = DNS_TimeGenerated, HostCustomEntity = Dvc, IPCustomEntity = SrcIpAddr, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map Domain entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any Domain IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "999e9f5d-db4a-4b07-a206-29c4e667b7e8"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet IP_TI = (ThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n// As there is potentially more than 1 indicator type for matching IP, taking NetworkIP first, then others if that is empty.\n// Taking the first non-empty value based on potential IOC match availability\n| extend TI_ipEntity = coalesce(NetworkIP, NetworkDestinationIP, NetworkSourceIP,EmailSourceIpAddress,\"\")\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId);\nlet TI_IP_List=IP_TI | summarize make_set( TI_ipEntity);\nimDns(starttime=ago(dt_lookBack), response_has_any_prefix=todynamic(toscalar(TI_IP_List)))\n | extend tilist = toscalar(TI_IP_List)\n | mv-expand tilist\n | extend SingleIP=tostring(tilist)\n | project-away tilist\n | where has_ipv4(DnsResponseName, SingleIP)\n | extend DNS_TimeGenerated = TimeGenerated\n| join IP_TI\n on $left.SingleIP == $right.TI_ipEntity\n| where DNS_TimeGenerated >= TimeGenerated and DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore, DNS_TimeGenerated,\nTI_ipEntity, Dvc, EventId, SubType, SrcIpAddr, DnsQuery, DnsResponseName, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress\n| extend timestamp = DNS_TimeGenerated, IPCustomEntity = TI_ipEntity, HostCustomEntity = Dvc, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map IP entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any IP IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "67775878-7f8b-4380-ac54-115e1e828901"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT6H",
"queryPeriod": "PT7H",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "SingleAlert"
},
"severity": "High",
"query": "// Rule Name - (Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations\r\n// Rule Description - Sensitive Data Access Outside Organziational Geolocations\r\n// Prerequisite 1: Onboard Azure Infomation Protection (https://docs.microsoft.com/en-us/azure/information-protection/requirements)\r\n// Prerequisite 2: Install AIP Unified Labeling Scanner (https://docs.microsoft.com/en-us/azure/information-protection/tutorial-install-scanner)\r\n// Prerequisite 3: Enable Azure Information Protection Connector (https://docs.microsoft.com/en-us/azure/sentinel/data-connectors-reference#azure-information-protection)\r\n// Prerequisite 4: Enable Azure Active Directory Connector (hhttps://docs.microsoft.com/en-us/azure/sentinel/connect-azure-active-directory)\r\nInformationProtectionLogs_CL\r\n| extend UserPrincipalName = UserId_s\r\n| where LabelName_s <> \"\"\r\n| join (SigninLogs) on UserPrincipalName\r\n| extend City = tostring(LocationDetails.city)\r\n// | where City <> \"New York\" // Configure Location Details within Organizational Requirements\r\n| extend State = tostring(LocationDetails.state)\r\n// | where State <> \"Texas\" // Configure Location Details within Organizational Requirements\r\n| extend Country_Region = tostring(LocationDetails.countryOrRegion)\r\n// | where Country_Region <> \"US\" // Configure Location Details within Organizational Requirements\r\n| summarize count() by UserPrincipalName, LabelName_s, Activity_s, City, State, Country_Region\r\n| sort by count_ desc\r\n| limit 250",
"suppressionDuration": "PT5H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5H",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": [],
"groupByCustomDetails": []
}
},
"customDetails": {
"Activity": "Activity_s",
"Where": "City"
},
"entityMappings": [
{
"entityType": "Account",
"fieldMappings": [
{
"identifier": "AadUserId",
"columnName": "UserPrincipalName"
}
]
}
],
"tactics": [],
"techniques": null,
"displayName": "(Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations",
"enabled": false,
"description": "Sensitive Data Access Outside Organziational Geolocations",
"alertRuleTemplateName": null
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT10M",
"queryPeriod": "PT10M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let default_file_ext_blocklist = dynamic(['.ps1', '.vbs', '.bat', '.scr']);\nlet custom_file_ext_blocklist=toscalar(_GetWatchlist('RiskyFileTypes') | extend Extension=column_ifexists(\"Extension\",\"\") | where isnotempty(Extension) | summarize make_set(Extension));\nlet file_ext_blocklist = array_concat(default_file_ext_blocklist, custom_file_ext_blocklist);\nimWebSession(url_has_any=file_ext_blocklist, eventresult='Success')\n| extend requestedFileName=tostring(split(tostring(parse_url(Url)[\"Path\"]),'/')[-1])\n| extend requestedFileExt=extract(@(\\.\\w+)$,1,requestedFileName, typeof(string))\n| where requestedFileExtension in (file_ext_blocklist)\n| summarize LastAttemptTime=max(TimeGenerated), NumFailedAttempts=count() by SrcIpAddr, requestedFileName, Url\n| extend IPCustomEntity = SrcIpAddr, UrlCustomEntity=Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"InitialAccess"
],
"techniques": null,
"displayName": "A client made a web request to a potentially harmful file (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request to a URL that holds a file type, including .ps1, .bat, .vbs, and .scr that can be harmful if downloaded. This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, deploy the Advanced SIEM information Model (ASIM).\nTo use this analytics rule, deploy the [Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM)",
"alertRuleTemplateName": "09c49590-4e9d-4da9-a34d-17222d0c9e7e"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT15M",
"queryPeriod": "PT15M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let threatCategory=\"Powershell\";\nlet knownUserAgentsIndicators = materialize(externaldata(UserAgent:string, Category:string)\n [ @\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/UnusualUserAgents.csv\"] \n with(format=\"csv\", ignoreFirstRecord=True));\nlet knownUserAgents=toscalar(knownUserAgentsIndicators | where Category==threatCategory | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet customUserAgents=toscalar(_GetWatchlist(\"UnusualUserAgents\") | where SearchKey==threatCategory | extend UserAgent=column_ifexists(\"UserAgent\",\"\") | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet fullUAList = array_concat(knownUserAgents,customUserAgents);\nimWebSession(httpuseragent_has_any=fullUAList)\n| project SrcIpAddr, Url, TimeGenerated,HttpUserAgent, SrcUsername\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"CommandAndControl",
"DefenseEvasion"
],
"techniques": null,
"displayName": "A host is potentially running PowerShell to send HTTP(S) requests (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request with a user agent header known to belong PowerShell. <br>You can add custom Powershell indicating User-Agent headers using a watchlist, for more information refer to the [UnusualUserAgents Watchlist](https://aka.ms/ASimUnusualUserAgentsWatchlist).<br><br>This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, [deploy the Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM).",
"alertRuleTemplateName": "42436753-9944-4d70-801c-daaa4d19ddd2"
}
}
]
}
Loading