Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
375 commits
Select commit Hold shift + click to select a range
2730313
Exported file: Dev-0228 File Path Hashes November 2021 - ASIM.json.json
azure-sentinel-canary[bot] Feb 27, 2023
24178c3
Exported file: Dev-0228 File Path Hashes November 2021.json.json
azure-sentinel-canary[bot] Feb 27, 2023
5a1cf3f
Exported file: Distributed Password cracking attempts in AzureAD.json…
azure-sentinel-canary[bot] Feb 27, 2023
b5cdcb2
Exported file: Duplicate Rule DisplayName 1 (1).json.json
azure-sentinel-canary[bot] Feb 27, 2023
8431355
Exported file: Duplicate Rule DisplayName 1.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b9cc93c
Exported file: Email access via active sync.json.json
azure-sentinel-canary[bot] Feb 27, 2023
4759959
Exported file: Excessive Amount of Denied Connections from a Single S…
azure-sentinel-canary[bot] Feb 27, 2023
09dfb95
Exported file: Excessive Denied Proxy Traffic.json.json
azure-sentinel-canary[bot] Feb 27, 2023
d0bc1c8
Exported file: Excessive Failed Authentication from Invalid Inputs.js…
azure-sentinel-canary[bot] Feb 27, 2023
b807536
Exported file: Excessive NXDOMAIN DNS Queries (Normalized DNS).json.json
azure-sentinel-canary[bot] Feb 27, 2023
b60346d
Exported file: Excessive NXDOMAIN DNS Queries.json.json
azure-sentinel-canary[bot] Feb 27, 2023
a5f6454
Exported file: Excessive Windows logon failures.json.json
azure-sentinel-canary[bot] Feb 27, 2023
1460124
Exported file: Excessive number of failed connections from a single s…
azure-sentinel-canary[bot] Feb 27, 2023
1097267
Exported file: Exchange AuditLog disabled.json.json
azure-sentinel-canary[bot] Feb 27, 2023
bbec0b2
Exported file: Exchange OAB Virtual Directory Attribute Containing Po…
azure-sentinel-canary[bot] Feb 27, 2023
bf5b686
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection (1).…
azure-sentinel-canary[bot] Feb 27, 2023
b1fcb89
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection.json…
azure-sentinel-canary[bot] Feb 27, 2023
d4b9c0f
Exported file: Exchange Server Vulnerabilities Disclosed March 2021 I…
azure-sentinel-canary[bot] Feb 27, 2023
55a29ce
Exported file: Exchange workflow MailItemsAccessed operation anomaly.…
azure-sentinel-canary[bot] Feb 27, 2023
d847bd4
Exported file: Explicit MFA Deny.json.json
azure-sentinel-canary[bot] Feb 27, 2023
e4794e9
Exported file: External Upstream Source Added to Azure DevOps Feed.js…
azure-sentinel-canary[bot] Feb 27, 2023
bad93a2
Exported file: External User Access Enabled.json.json
azure-sentinel-canary[bot] Feb 27, 2023
9f5e4b1
Exported file: External guest invitations by default guest followed b…
azure-sentinel-canary[bot] Feb 27, 2023
4c44011
Exported file: External user added and removed in short timeframe.jso…
azure-sentinel-canary[bot] Feb 27, 2023
4beac24
Exported file: Failed AWS Console logons but success logon to AzureAD…
azure-sentinel-canary[bot] Feb 27, 2023
4ed4ae7
Exported file: Failed AzureAD logons but success logon to AWS Console…
azure-sentinel-canary[bot] Feb 27, 2023
545ddbb
Exported file: Failed AzureAD logons but success logon to host.json.json
azure-sentinel-canary[bot] Feb 27, 2023
54b9a42
Exported file: Failed Logins from Unknown or Invalid User.json.json
azure-sentinel-canary[bot] Feb 27, 2023
ce15dc9
Exported file: Failed host logons but success logon to AzureAD.json.json
azure-sentinel-canary[bot] Feb 27, 2023
85cffcb
Exported file: Failed login attempts to Azure Portal.json.json
azure-sentinel-canary[bot] Feb 27, 2023
c93543b
Exported file: Failed logon attempts by valid accounts within 10 mins…
azure-sentinel-canary[bot] Feb 27, 2023
3263b16
Exported file: Failed logon attempts in authpriv.json.json
azure-sentinel-canary[bot] Feb 27, 2023
4e0f9e0
Exported file: First access credential added to Application or Servic…
azure-sentinel-canary[bot] Feb 27, 2023
37e2cb4
Exported file: Fortinet - Beacon pattern detected.json.json
azure-sentinel-canary[bot] Feb 27, 2023
a6b8f20
Exported file: Full Admin policy created and then attached to Roles, …
azure-sentinel-canary[bot] Feb 27, 2023
35a8fd5
Exported file: Gain Code Execution on ADFS Server via Remote WMI Exec…
azure-sentinel-canary[bot] Feb 27, 2023
b3b866d
Exported file: Gain Code Execution on ADFS Server via SMB + Remote Se…
azure-sentinel-canary[bot] Feb 27, 2023
fc1ef7e
Exported file: GitHub Activites from a New Country.json.json
azure-sentinel-canary[bot] Feb 27, 2023
41d48c3
Exported file: GitHub Security Vulnerability in Repository.json.json
azure-sentinel-canary[bot] Feb 27, 2023
bc20130
Exported file: GitHub Signin Burst from Multiple Locations.json.json
azure-sentinel-canary[bot] Feb 27, 2023
542da20
Exported file: GitHub Two Factor Auth Disable.json.json
azure-sentinel-canary[bot] Feb 27, 2023
95bbb4c
Exported file: Group created then added to built in domain local or g…
azure-sentinel-canary[bot] Feb 27, 2023
531cc66
Exported file: HAFNIUM New UM Service Child Process.json.json
azure-sentinel-canary[bot] Feb 27, 2023
d8f1c0d
Exported file: HAFNIUM Suspicious Exchange Request.json.json
azure-sentinel-canary[bot] Feb 27, 2023
9c78c95
Exported file: HAFNIUM Suspicious File Downloads_.json.json
azure-sentinel-canary[bot] Feb 27, 2023
7d9ca82
Exported file: HAFNIUM Suspicious UM Service Error.json.json
azure-sentinel-canary[bot] Feb 27, 2023
838b89b
Exported file: HAFNIUM UM Service writing suspicious file.json.json
azure-sentinel-canary[bot] Feb 27, 2023
d1572b7
Exported file: High Number of Urgent Vulnerabilities Detected (1).jso…
azure-sentinel-canary[bot] Feb 27, 2023
fffb628
Exported file: High Number of Urgent Vulnerabilities Detected.json.json
azure-sentinel-canary[bot] Feb 27, 2023
456dda3
Exported file: High Urgency Cyberpion Action Items.json.json
azure-sentinel-canary[bot] Feb 27, 2023
ae005e0
Exported file: High count of connections by client IP on many ports.j…
azure-sentinel-canary[bot] Feb 27, 2023
3a57e7f
Exported file: High count of failed attempts from same client IP.json…
azure-sentinel-canary[bot] Feb 27, 2023
486b93b
Exported file: High count of failed logons by a user.json.json
azure-sentinel-canary[bot] Feb 27, 2023
a4b83a1
Exported file: IP with multiple failed Azure AD logins successfully l…
azure-sentinel-canary[bot] Feb 27, 2023
32d07f3
Exported file: Known Barium IP.json.json
azure-sentinel-canary[bot] Feb 27, 2023
c6f6db9
Exported file: Known Barium domains.json.json
azure-sentinel-canary[bot] Feb 27, 2023
63c5c1c
Exported file: Known CERIUM domains and hashes.json.json
azure-sentinel-canary[bot] Feb 27, 2023
93a4a18
Exported file: Known GALLIUM domains and hashes.json.json
azure-sentinel-canary[bot] Feb 27, 2023
f410c08
Exported file: Known IRIDIUM IP.json.json
azure-sentinel-canary[bot] Feb 27, 2023
a65e3a3
Exported file: Known Malware Detected.json.json
azure-sentinel-canary[bot] Feb 27, 2023
3a9d958
Exported file: Known Manganese IP and UserAgent activity.json.json
azure-sentinel-canary[bot] Feb 27, 2023
29cd85e
Exported file: Known NICKEL domains and hashes.json.json
azure-sentinel-canary[bot] Feb 27, 2023
a600ee7
Exported file: Known PHOSPHORUS group domains_IP - October 2020.json.…
azure-sentinel-canary[bot] Feb 27, 2023
1e95d72
Exported file: Known Phosphorus group domains_IP.json.json
azure-sentinel-canary[bot] Feb 27, 2023
08b976d
Exported file: Known STRONTIUM group domains - July 2019.json.json
azure-sentinel-canary[bot] Feb 27, 2023
1968818
Exported file: Known ZINC Comebacker and Klackring malware hashes.jso…
azure-sentinel-canary[bot] Feb 27, 2023
f3e8ff4
Exported file: Known ZINC related maldoc hash.json.json
azure-sentinel-canary[bot] Feb 27, 2023
c8f97f3
Exported file: Linked Malicious Storage Artifacts.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b5a673c
Exported file: Log4j vulnerability exploit aka Log4Shell IP IOC.json.…
azure-sentinel-canary[bot] Feb 27, 2023
4a21604
Exported file: Login to AWS Management Console without MFA.json.json
azure-sentinel-canary[bot] Feb 27, 2023
2f4023c
Exported file: MFA Rejected by User.json.json
azure-sentinel-canary[bot] Feb 27, 2023
57faab0
Exported file: MFA disabled for a user.json.json
azure-sentinel-canary[bot] Feb 27, 2023
ef7432e
Exported file: MSHTML vulnerability CVE-2021-40444 attack.json.json
azure-sentinel-canary[bot] Feb 27, 2023
7ecc095
Exported file: Mail redirect via ExO transport rule.json.json
azure-sentinel-canary[bot] Feb 27, 2023
56654f1
Exported file: Mail.Read Permissions Granted to Application.json.json
azure-sentinel-canary[bot] Feb 27, 2023
84bb192
Exported file: Malformed user agent.json.json
azure-sentinel-canary[bot] Feb 27, 2023
f18f67c
Exported file: Malicious Inbox Rule.json.json
azure-sentinel-canary[bot] Feb 27, 2023
cfd68e8
Exported file: Malicious web application requests linked with Microso…
azure-sentinel-canary[bot] Feb 27, 2023
08fd956
Exported file: Malware in the recycle bin (Normalized Process Events)…
azure-sentinel-canary[bot] Feb 27, 2023
d820bb2
Exported file: Malware in the recycle bin.json.json
azure-sentinel-canary[bot] Feb 27, 2023
a6363da
Exported file: Mass secret retrieval from Azure Key Vault.json.json
azure-sentinel-canary[bot] Feb 27, 2023
e23bdae
Exported file: Microsoft COVID-19 file hash indicator matches.json.json
azure-sentinel-canary[bot] Feb 27, 2023
baabb4d
Exported file: Modified domain federation trust settings.json.json
azure-sentinel-canary[bot] Feb 27, 2023
3fe569f
Exported file: Monitor AWS Credential abuse or hijacking.json.json
azure-sentinel-canary[bot] Feb 27, 2023
996a4c2
Exported file: Multiple Password Reset by user.json.json
azure-sentinel-canary[bot] Feb 27, 2023
228a450
Exported file: Multiple RDP connections from Single System.json.json
azure-sentinel-canary[bot] Feb 27, 2023
8b26566
Exported file: Multiple Teams deleted by a single user.json.json
azure-sentinel-canary[bot] Feb 27, 2023
6f925e5
Exported file: Multiple users email forwarded to same destination.jso…
azure-sentinel-canary[bot] Feb 27, 2023
15a6d98
Exported file: NOBELIUM - Domain and IP IOCs - March 2021.json.json
azure-sentinel-canary[bot] Feb 27, 2023
eee96ce
Exported file: NOBELIUM - Domain, Hash and IP IOCs - May 2021.json.json
azure-sentinel-canary[bot] Feb 27, 2023
5eda055
Exported file: NOBELIUM - Script payload stored in Registry.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b527729
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Feb 27, 2023
8df14a9
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Feb 27, 2023
cfc172d
Exported file: NOBELIUM IOCs related to FoggyWeb backdoor.json.json
azure-sentinel-canary[bot] Feb 27, 2023
ec85d8b
Exported file: Network endpoint to host executable correlation.json.json
azure-sentinel-canary[bot] Feb 27, 2023
06fd701
Exported file: New Agent Added to Pool by New User or Added to a New …
azure-sentinel-canary[bot] Feb 27, 2023
25d4a19
Exported file: New CloudShell User.json.json
azure-sentinel-canary[bot] Feb 27, 2023
f535ce8
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Feb 27, 2023
c1358ec
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Feb 27, 2023
0af43ea
Exported file: New PA, PCA, or PCAS added to Azure DevOps.json.json
azure-sentinel-canary[bot] Feb 27, 2023
e060bf0
Exported file: New UserAgent observed in last 24 hours.json.json
azure-sentinel-canary[bot] Feb 27, 2023
07a5aef
Exported file: New access credential added to Application or Service …
azure-sentinel-canary[bot] Feb 27, 2023
b0346f7
Exported file: New executable via Office FileUploaded Operation.json.…
azure-sentinel-canary[bot] Feb 27, 2023
7011fef
Exported file: New internet-exposed SSH endpoints.json.json
azure-sentinel-canary[bot] Feb 27, 2023
234c17e
Exported file: New user created and added to the built-in administrat…
azure-sentinel-canary[bot] Feb 27, 2023
f62cc81
Exported file: Non Domain Controller Active Directory Replication.jso…
azure-sentinel-canary[bot] Feb 27, 2023
3b27cbd
Exported file: OMI Vulnerability Exploitation.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b11eeb3
Exported file: Office policy tampering.json.json
azure-sentinel-canary[bot] Feb 27, 2023
aad2414
Exported file: PIM Elevation Request Rejected.json.json
azure-sentinel-canary[bot] Feb 27, 2023
619d6da
Exported file: Palo Alto - possible internal to external port scannin…
azure-sentinel-canary[bot] Feb 27, 2023
61bea94
Exported file: Palo Alto - potential beaconing detected.json.json
azure-sentinel-canary[bot] Feb 27, 2023
7cdf3cf
Exported file: Password spray attack against Azure AD application.jso…
azure-sentinel-canary[bot] Feb 27, 2023
52f1bcf
Exported file: Port Scan Detected.json.json
azure-sentinel-canary[bot] Feb 27, 2023
831fc3e
Exported file: Possible STRONTIUM attempted credential harvesting - O…
azure-sentinel-canary[bot] Feb 27, 2023
073de69
Exported file: Possible STRONTIUM attempted credential harvesting - S…
azure-sentinel-canary[bot] Feb 27, 2023
cdc873e
Exported file: Possible contact with a domain generated by a DGA.json…
azure-sentinel-canary[bot] Feb 27, 2023
25ce915
Exported file: Potential Build Process Compromise - MDE.json.json
azure-sentinel-canary[bot] Feb 27, 2023
dd56fff
Exported file: Potential Build Process Compromise.json.json
azure-sentinel-canary[bot] Feb 27, 2023
1d6537d
Exported file: Potential DGA detected (ASimDNS).json.json
azure-sentinel-canary[bot] Feb 27, 2023
41a09e3
Exported file: Potential DGA detected.json.json
azure-sentinel-canary[bot] Feb 27, 2023
01e028e
Exported file: Potential DHCP Starvation Attack.json.json
azure-sentinel-canary[bot] Feb 27, 2023
8a3352a
Exported file: Potential Kerberoasting.json.json
azure-sentinel-canary[bot] Feb 27, 2023
180e0c8
Exported file: Potential Password Spray Attack (Uses Authentication N…
azure-sentinel-canary[bot] Feb 27, 2023
b16923a
Exported file: Potential Password Spray Attack.json.json
azure-sentinel-canary[bot] Feb 27, 2023
6377b75
Exported file: Powershell Empire cmdlets seen in command line.json.json
azure-sentinel-canary[bot] Feb 27, 2023
daa0e5e
Exported file: Privileged Accounts - Sign in Failure Spikes.json.json
azure-sentinel-canary[bot] Feb 27, 2023
adf2d68
Exported file: Privileged Role Assigned Outside PIM.json.json
azure-sentinel-canary[bot] Feb 27, 2023
77415ae
Exported file: Probable AdFind Recon Tool Usage (Normalized Process E…
azure-sentinel-canary[bot] Feb 27, 2023
68b0eff
Exported file: Probable AdFind Recon Tool Usage.json.json
azure-sentinel-canary[bot] Feb 27, 2023
c778486
Exported file: Process executed from binary hidden in Base64 encoded …
azure-sentinel-canary[bot] Feb 27, 2023
706b33d
Exported file: Process execution frequency anomaly.json.json
azure-sentinel-canary[bot] Feb 27, 2023
19dfb4f
Exported file: ProofpointPOD - Binary file in attachment.json.json
azure-sentinel-canary[bot] Feb 27, 2023
7de40d8
Exported file: ProofpointPOD - Email sender IP in TI list.json.json
azure-sentinel-canary[bot] Feb 27, 2023
3d13317
Exported file: ProofpointPOD - Email sender in TI list.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b45b822
Exported file: ProofpointPOD - High risk message not discarded.json.json
azure-sentinel-canary[bot] Feb 27, 2023
e199c7c
Exported file: ProofpointPOD - Multiple archived attachments to the s…
azure-sentinel-canary[bot] Feb 27, 2023
f857a63
Exported file: ProofpointPOD - Multiple large emails to the same reci…
azure-sentinel-canary[bot] Feb 27, 2023
bd4be32
Exported file: ProofpointPOD - Multiple protected emails to unknown r…
azure-sentinel-canary[bot] Feb 27, 2023
35f8a94
Exported file: ProofpointPOD - Possible data exfiltration to private …
azure-sentinel-canary[bot] Feb 27, 2023
4e514aa
Exported file: ProofpointPOD - Suspicious attachment.json.json
azure-sentinel-canary[bot] Feb 27, 2023
f42f795
Exported file: ProofpointPOD - Weak ciphers.json.json
azure-sentinel-canary[bot] Feb 27, 2023
258f4d9
Exported file: PulseConnectSecure - Large Number of Distinct Failed U…
azure-sentinel-canary[bot] Feb 27, 2023
c945f70
Exported file: PulseConnectSecure - Potential Brute Force Attempts.js…
azure-sentinel-canary[bot] Feb 27, 2023
2762b09
Exported file: RDP Nesting.json.json
azure-sentinel-canary[bot] Feb 27, 2023
e856841
Exported file: Rare RDP Connections.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b893357
Exported file: Rare and potentially high-risk Office operations.json.…
azure-sentinel-canary[bot] Feb 27, 2023
a8964d8
Exported file: Rare application consent.json.json
azure-sentinel-canary[bot] Feb 27, 2023
f2b4c8c
Exported file: Rare client observed with high reverse DNS lookup coun…
azure-sentinel-canary[bot] Feb 27, 2023
995705f
Exported file: Rare subscription-level operations in Azure.json.json
azure-sentinel-canary[bot] Feb 27, 2023
9edb0d8
Exported file: Request for single resource on domain.json.json
azure-sentinel-canary[bot] Feb 27, 2023
2636519
Exported file: SOURGUM Actor IOC - July 2021.json.json
azure-sentinel-canary[bot] Feb 27, 2023
3b12327
Exported file: SSH - Potential Brute Force.json.json
azure-sentinel-canary[bot] Feb 27, 2023
fc0e385
Exported file: SUNBURST and SUPERNOVA backdoor hashes (Normalized Fil…
azure-sentinel-canary[bot] Feb 27, 2023
843b1dc
Exported file: SUNBURST and SUPERNOVA backdoor hashes.json.json
azure-sentinel-canary[bot] Feb 27, 2023
ee6b2ed
Exported file: SUNBURST network beacons.json.json
azure-sentinel-canary[bot] Feb 27, 2023
67d1b10
Exported file: SUNBURST suspicious SolarWinds child processes (Normal…
azure-sentinel-canary[bot] Feb 27, 2023
74402ed
Exported file: SUNBURST suspicious SolarWinds child processes.json.json
azure-sentinel-canary[bot] Feb 27, 2023
3c90575
Exported file: SUNSPOT log file creation.json.json
azure-sentinel-canary[bot] Feb 27, 2023
9e5f7b2
Exported file: SUNSPOT malware hashes.json.json
azure-sentinel-canary[bot] Feb 27, 2023
aa43916
Exported file: SUPERNOVA webshell.json.json
azure-sentinel-canary[bot] Feb 27, 2023
05057e8
Exported file: Security Event log cleared.json.json
azure-sentinel-canary[bot] Feb 27, 2023
9bc244b
Exported file: Security Service Registry ACL Modification.json.json
azure-sentinel-canary[bot] Feb 27, 2023
e62d6f7
Exported file: SecurityEvent - Multiple authentication failures follo…
azure-sentinel-canary[bot] Feb 27, 2023
d390a27
Exported file: Sensitive Azure Key Vault operations.json.json
azure-sentinel-canary[bot] Feb 27, 2023
e163b0b
Exported file: Several deny actions registered.json.json
azure-sentinel-canary[bot] Feb 27, 2023
cc26124
Exported file: SharePointFileOperation via devices with previously un…
azure-sentinel-canary[bot] Feb 27, 2023
2a9574f
Exported file: SharePointFileOperation via previously unseen IPs.json…
azure-sentinel-canary[bot] Feb 27, 2023
10e7bb6
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Feb 27, 2023
e799fc0
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Feb 27, 2023
a809e74
Exported file: Solorigate Defender Detections.json.json
azure-sentinel-canary[bot] Feb 27, 2023
7ebb1e8
Exported file: Solorigate Domains Found in VM Insights.json.json
azure-sentinel-canary[bot] Feb 27, 2023
bff9ef3
Exported file: Solorigate Named Pipe.json.json
azure-sentinel-canary[bot] Feb 27, 2023
561a756
Exported file: Solorigate Network Beacon.json.json
azure-sentinel-canary[bot] Feb 27, 2023
ead2794
Exported file: Squid proxy events for ToR proxies.json.json
azure-sentinel-canary[bot] Feb 27, 2023
9322159
Exported file: Squid proxy events related to mining pools.json.json
azure-sentinel-canary[bot] Feb 27, 2023
4725f04
Exported file: Starting or Stopping HealthService to Avoid Detection.…
azure-sentinel-canary[bot] Feb 27, 2023
ab46033
Exported file: Successful SSH brute force attack.json.json
azure-sentinel-canary[bot] Feb 27, 2023
8b900be
Exported file: Successful logon from IP and failure from a different …
azure-sentinel-canary[bot] Feb 27, 2023
9e0b6e0
Exported file: Suspicious Resource deployment.json.json
azure-sentinel-canary[bot] Feb 27, 2023
4e1ba41
Exported file: Suspicious Service Principal creation activity.json.json
azure-sentinel-canary[bot] Feb 27, 2023
49d6cbd
Exported file: Suspicious application consent for offline access.json…
azure-sentinel-canary[bot] Feb 27, 2023
828ca6c
Exported file: Suspicious application consent similar to O365 Attack …
azure-sentinel-canary[bot] Feb 27, 2023
90f0f7d
Exported file: Suspicious application consent similar to PwnAuth.json…
azure-sentinel-canary[bot] Feb 27, 2023
f84051d
Exported file: Suspicious granting of permissions to an account.json.…
azure-sentinel-canary[bot] Feb 27, 2023
6de4d44
Exported file: Suspicious link sharing pattern.json.json
azure-sentinel-canary[bot] Feb 27, 2023
166378b
Exported file: Suspicious number of resource creation or deployment a…
azure-sentinel-canary[bot] Feb 27, 2023
d57311f
Exported file: TEARDROP memory-only dropper.json.json
azure-sentinel-canary[bot] Feb 27, 2023
26545c8
Exported file: THALLIUM domains included in DCU takedown.json.json
azure-sentinel-canary[bot] Feb 27, 2023
0cbb25a
Exported file: TI map Domain entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Feb 27, 2023
2dcc78f
Exported file: TI map Domain entity to DnsEvent.json.json
azure-sentinel-canary[bot] Feb 27, 2023
0d85200
Exported file: TI map Domain entity to PaloAlto.json.json
azure-sentinel-canary[bot] Feb 27, 2023
452e826
Exported file: TI map Domain entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Feb 27, 2023
5fd5420
Exported file: TI map Domain entity to Syslog.json.json
azure-sentinel-canary[bot] Feb 27, 2023
6f5416a
Exported file: TI map Email entity to AzureActivity.json.json
azure-sentinel-canary[bot] Feb 27, 2023
f3afc69
Exported file: TI map Email entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Feb 27, 2023
c5344ce
Exported file: TI map Email entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Feb 27, 2023
92933c0
Exported file: TI map Email entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Feb 27, 2023
f6128e2
Exported file: TI map Email entity to SecurityEvent.json.json
azure-sentinel-canary[bot] Feb 27, 2023
cca3405
Exported file: TI map Email entity to SigninLogs.json.json
azure-sentinel-canary[bot] Feb 27, 2023
d438295
Exported file: TI map File Hash to CommonSecurityLog Event.json.json
azure-sentinel-canary[bot] Feb 27, 2023
fec35ea
Exported file: TI map File Hash to Security Event.json.json
azure-sentinel-canary[bot] Feb 27, 2023
6f4d9d1
Exported file: TI map IP entity to AWSCloudTrail.json.json
azure-sentinel-canary[bot] Feb 27, 2023
a1738ff
Exported file: TI map IP entity to AppServiceHTTPLogs.json.json
azure-sentinel-canary[bot] Feb 27, 2023
02c85fc
Exported file: TI map IP entity to Azure Key Vault logs.json.json
azure-sentinel-canary[bot] Feb 27, 2023
adbe7ec
Exported file: TI map IP entity to Azure SQL Security Audit Events.js…
azure-sentinel-canary[bot] Feb 27, 2023
88574aa
Exported file: TI map IP entity to AzureActivity.json.json
azure-sentinel-canary[bot] Feb 27, 2023
a04f74f
Exported file: TI map IP entity to AzureFirewall.json.json
azure-sentinel-canary[bot] Feb 27, 2023
daec71c
Exported file: TI map IP entity to AzureNetworkAnalytics_CL (NSG Flow…
azure-sentinel-canary[bot] Feb 27, 2023
5e72685
Exported file: TI map IP entity to DnsEvents.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b866e55
Exported file: TI map IP entity to Duo Security.json.json
azure-sentinel-canary[bot] Feb 27, 2023
6243c18
Exported file: TI map IP entity to GitHub_CL.json.json
azure-sentinel-canary[bot] Feb 27, 2023
baed79a
Exported file: TI map IP entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Feb 27, 2023
79fb732
Exported file: TI map IP entity to SigninLogs.json.json
azure-sentinel-canary[bot] Feb 27, 2023
90df059
Exported file: TI map IP entity to VMConnection.json.json
azure-sentinel-canary[bot] Feb 27, 2023
d12f1b0
Exported file: TI map IP entity to W3CIISLog.json.json
azure-sentinel-canary[bot] Feb 27, 2023
c3dd104
Exported file: TI map IP entity to WireData.json.json
azure-sentinel-canary[bot] Feb 27, 2023
f6f26a2
Exported file: TI map URL entity to AuditLogs.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b8ca73b
Exported file: TI map URL entity to OfficeActivity data.json.json
azure-sentinel-canary[bot] Feb 27, 2023
430a7f5
Exported file: TI map URL entity to PaloAlto data.json.json
azure-sentinel-canary[bot] Feb 27, 2023
cef2fb1
Exported file: TI map URL entity to SecurityAlert data.json.json
azure-sentinel-canary[bot] Feb 27, 2023
9af96cb
Exported file: TI map URL entity to Syslog data.json.json
azure-sentinel-canary[bot] Feb 27, 2023
2a46056
Exported file: Threats detected by Eset.json.json
azure-sentinel-canary[bot] Feb 27, 2023
0742260
Exported file: Time series anomaly detection for total volume of traf…
azure-sentinel-canary[bot] Feb 27, 2023
de52935
Exported file: Time series anomaly for data size transferred to publi…
azure-sentinel-canary[bot] Feb 27, 2023
3d7a4e6
Exported file: Trust Monitor Event.json.json
azure-sentinel-canary[bot] Feb 27, 2023
3234bdc
Exported file: User Accessed Suspicious URL Categories.json.json
azure-sentinel-canary[bot] Feb 27, 2023
e1dfa2c
Exported file: User Accounts - Sign in Failure due to CA Spikes.json.…
azure-sentinel-canary[bot] Feb 27, 2023
c4c856c
Exported file: User Assigned Privileged Role.json.json
azure-sentinel-canary[bot] Feb 27, 2023
d08c930
Exported file: User Login from Different Countries within 3 hours.jso…
azure-sentinel-canary[bot] Feb 27, 2023
1d31635
Exported file: User account added to built in domain local or global …
azure-sentinel-canary[bot] Feb 27, 2023
d5451c0
Exported file: User account created and deleted within 10 mins.json.json
azure-sentinel-canary[bot] Feb 27, 2023
77d4d19
Exported file: User account enabled and disabled within 10 mins.json.…
azure-sentinel-canary[bot] Feb 27, 2023
1411a6d
Exported file: User added to Azure Active Directory Privileged Groups…
azure-sentinel-canary[bot] Feb 27, 2023
08a1ac5
Exported file: User agent search for log4j exploitation attempt.json.…
azure-sentinel-canary[bot] Feb 27, 2023
035627a
Exported file: User joining Zoom meeting from suspicious timezone.jso…
azure-sentinel-canary[bot] Feb 27, 2023
d830619
Exported file: User login from different countries within 3 hours (Us…
azure-sentinel-canary[bot] Feb 27, 2023
63de8dd
Exported file: Users searching for VIP user activity.json.json
azure-sentinel-canary[bot] Feb 27, 2023
3516cb0
Exported file: Valid Analytic Rule 1.json.json
azure-sentinel-canary[bot] Feb 27, 2023
b3156dc
Exported file: Vectra AI Detect - Detections with High Severity.json.…
azure-sentinel-canary[bot] Feb 27, 2023
4cd8bdb
Exported file: Vectra AI Detect - New Campaign Detected.json.json
azure-sentinel-canary[bot] Feb 27, 2023
43b29b4
Exported file: Vectra AI Detect - Suspected Compromised Account.json.…
azure-sentinel-canary[bot] Feb 27, 2023
cc18dff
Exported file: Vectra AI Detect - Suspected Compromised Host.json.json
azure-sentinel-canary[bot] Feb 27, 2023
ed98a47
Exported file: Vectra AI Detect - Suspicious Behaviors.json.json
azure-sentinel-canary[bot] Feb 27, 2023
def0082
Exported file: Vulnerable Machines related to OMIGOD CVE-2021-38647.j…
azure-sentinel-canary[bot] Feb 27, 2023
7d65587
Exported file: Vulnerable Machines related to log4j CVE-2021-44228.js…
azure-sentinel-canary[bot] Feb 27, 2023
b0f7b16
Exported file: Wazuh - Large Number of Web errors from an IP.json.json
azure-sentinel-canary[bot] Feb 27, 2023
22b13ae
Exported file: Web sites blocked by Eset.json.json
azure-sentinel-canary[bot] Feb 27, 2023
06dcb6e
Exported file: Zoom E2E Encryption Disabled.json.json
azure-sentinel-canary[bot] Feb 27, 2023
51c45ea
Exported file: new file added -- 2_14_2013.json.json
azure-sentinel-canary[bot] Feb 27, 2023
ef0970f
Exported file: new test rule 1.json.json
azure-sentinel-canary[bot] Feb 27, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "ThreatIntelligence",
"apiVersion": "2022-09-01-preview",
"properties": {
"alertRuleTemplateName": "0dd422ee-e6af-4204-b219-f59ac172e4c6",
"severity": "Medium",
"tactics": [
"Persistence",
"LateralMovement"
],
"techniques": [],
"displayName": "(Preview) Microsoft Threat Intelligence Analytics",
"enabled": true,
"description": "This rule generates an alert when a Microsoft Threat Intelligence Indicator gets matched with your event logs. The alerts are very high fidelity and are turned ON by default. \n\nNote : It is advised to turn off any custom alert rules which match the threat intelligence indicators with the same event logs matched by this analytics to prevent duplicate alerts."
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/516cc0be-cc97-486b-928e-0e222352ba46')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/516cc0be-cc97-486b-928e-0e222352ba46')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet DomainTIs= ThreatIntelligenceIndicator\n | where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n // Picking up only IOC's that contain the entities we want\n | where isnotempty(DomainName)\n | where Active == true\n | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId;\nlet Domains= toscalar(DomainTIs | where isnotempty(DomainName) |summarize make_set(DomainName));\nDomainTIs\n | join (\n imDns(starttime=ago(dt_lookBack), domain_has_any=(Domains))\n | extend DNS_TimeGenerated = TimeGenerated\n) on $left.DomainName==$right.DnsQuery\n| where DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, Url, DNS_TimeGenerated, Dvc, SrcIpAddr, DnsQuery, QueryType\n| extend timestamp = DNS_TimeGenerated, HostCustomEntity = Dvc, IPCustomEntity = SrcIpAddr, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map Domain entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any Domain IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "999e9f5d-db4a-4b07-a206-29c4e667b7e8"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet IP_TI = (ThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n// As there is potentially more than 1 indicator type for matching IP, taking NetworkIP first, then others if that is empty.\n// Taking the first non-empty value based on potential IOC match availability\n| extend TI_ipEntity = coalesce(NetworkIP, NetworkDestinationIP, NetworkSourceIP,EmailSourceIpAddress,\"\")\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId);\nlet TI_IP_List=IP_TI | summarize make_set( TI_ipEntity);\nimDns(starttime=ago(dt_lookBack), response_has_any_prefix=todynamic(toscalar(TI_IP_List)))\n | extend tilist = toscalar(TI_IP_List)\n | mv-expand tilist\n | extend SingleIP=tostring(tilist)\n | project-away tilist\n | where has_ipv4(DnsResponseName, SingleIP)\n | extend DNS_TimeGenerated = TimeGenerated\n| join IP_TI\n on $left.SingleIP == $right.TI_ipEntity\n| where DNS_TimeGenerated >= TimeGenerated and DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore, DNS_TimeGenerated,\nTI_ipEntity, Dvc, EventId, SubType, SrcIpAddr, DnsQuery, DnsResponseName, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress\n| extend timestamp = DNS_TimeGenerated, IPCustomEntity = TI_ipEntity, HostCustomEntity = Dvc, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map IP entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any IP IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "67775878-7f8b-4380-ac54-115e1e828901"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT6H",
"queryPeriod": "PT7H",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "SingleAlert"
},
"severity": "High",
"query": "// Rule Name - (Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations\r\n// Rule Description - Sensitive Data Access Outside Organziational Geolocations\r\n// Prerequisite 1: Onboard Azure Infomation Protection (https://docs.microsoft.com/en-us/azure/information-protection/requirements)\r\n// Prerequisite 2: Install AIP Unified Labeling Scanner (https://docs.microsoft.com/en-us/azure/information-protection/tutorial-install-scanner)\r\n// Prerequisite 3: Enable Azure Information Protection Connector (https://docs.microsoft.com/en-us/azure/sentinel/data-connectors-reference#azure-information-protection)\r\n// Prerequisite 4: Enable Azure Active Directory Connector (hhttps://docs.microsoft.com/en-us/azure/sentinel/connect-azure-active-directory)\r\nInformationProtectionLogs_CL\r\n| extend UserPrincipalName = UserId_s\r\n| where LabelName_s <> \"\"\r\n| join (SigninLogs) on UserPrincipalName\r\n| extend City = tostring(LocationDetails.city)\r\n// | where City <> \"New York\" // Configure Location Details within Organizational Requirements\r\n| extend State = tostring(LocationDetails.state)\r\n// | where State <> \"Texas\" // Configure Location Details within Organizational Requirements\r\n| extend Country_Region = tostring(LocationDetails.countryOrRegion)\r\n// | where Country_Region <> \"US\" // Configure Location Details within Organizational Requirements\r\n| summarize count() by UserPrincipalName, LabelName_s, Activity_s, City, State, Country_Region\r\n| sort by count_ desc\r\n| limit 250",
"suppressionDuration": "PT5H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5H",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": [],
"groupByCustomDetails": []
}
},
"customDetails": {
"Activity": "Activity_s",
"Where": "City"
},
"entityMappings": [
{
"entityType": "Account",
"fieldMappings": [
{
"identifier": "AadUserId",
"columnName": "UserPrincipalName"
}
]
}
],
"tactics": [],
"techniques": null,
"displayName": "(Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations",
"enabled": false,
"description": "Sensitive Data Access Outside Organziational Geolocations",
"alertRuleTemplateName": null
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT10M",
"queryPeriod": "PT10M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let default_file_ext_blocklist = dynamic(['.ps1', '.vbs', '.bat', '.scr']);\nlet custom_file_ext_blocklist=toscalar(_GetWatchlist('RiskyFileTypes') | extend Extension=column_ifexists(\"Extension\",\"\") | where isnotempty(Extension) | summarize make_set(Extension));\nlet file_ext_blocklist = array_concat(default_file_ext_blocklist, custom_file_ext_blocklist);\nimWebSession(url_has_any=file_ext_blocklist, eventresult='Success')\n| extend requestedFileName=tostring(split(tostring(parse_url(Url)[\"Path\"]),'/')[-1])\n| extend requestedFileExt=extract(@(\\.\\w+)$,1,requestedFileName, typeof(string))\n| where requestedFileExtension in (file_ext_blocklist)\n| summarize LastAttemptTime=max(TimeGenerated), NumFailedAttempts=count() by SrcIpAddr, requestedFileName, Url\n| extend IPCustomEntity = SrcIpAddr, UrlCustomEntity=Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"InitialAccess"
],
"techniques": null,
"displayName": "A client made a web request to a potentially harmful file (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request to a URL that holds a file type, including .ps1, .bat, .vbs, and .scr that can be harmful if downloaded. This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, deploy the Advanced SIEM information Model (ASIM).\nTo use this analytics rule, deploy the [Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM)",
"alertRuleTemplateName": "09c49590-4e9d-4da9-a34d-17222d0c9e7e"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT15M",
"queryPeriod": "PT15M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let threatCategory=\"Powershell\";\nlet knownUserAgentsIndicators = materialize(externaldata(UserAgent:string, Category:string)\n [ @\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/UnusualUserAgents.csv\"] \n with(format=\"csv\", ignoreFirstRecord=True));\nlet knownUserAgents=toscalar(knownUserAgentsIndicators | where Category==threatCategory | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet customUserAgents=toscalar(_GetWatchlist(\"UnusualUserAgents\") | where SearchKey==threatCategory | extend UserAgent=column_ifexists(\"UserAgent\",\"\") | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet fullUAList = array_concat(knownUserAgents,customUserAgents);\nimWebSession(httpuseragent_has_any=fullUAList)\n| project SrcIpAddr, Url, TimeGenerated,HttpUserAgent, SrcUsername\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"CommandAndControl",
"DefenseEvasion"
],
"techniques": null,
"displayName": "A host is potentially running PowerShell to send HTTP(S) requests (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request with a user agent header known to belong PowerShell. <br>You can add custom Powershell indicating User-Agent headers using a watchlist, for more information refer to the [UnusualUserAgents Watchlist](https://aka.ms/ASimUnusualUserAgentsWatchlist).<br><br>This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, [deploy the Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM).",
"alertRuleTemplateName": "42436753-9944-4d70-801c-daaa4d19ddd2"
}
}
]
}
Loading