Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
375 commits
Select commit Hold shift + click to select a range
2b2c932
Exported file: Dev-0228 File Path Hashes November 2021 - ASIM.json.json
azure-sentinel-canary[bot] Mar 2, 2023
cece38b
Exported file: Dev-0228 File Path Hashes November 2021.json.json
azure-sentinel-canary[bot] Mar 2, 2023
380480b
Exported file: Distributed Password cracking attempts in AzureAD.json…
azure-sentinel-canary[bot] Mar 2, 2023
5fc94b8
Exported file: Duplicate Rule DisplayName 1 (1).json.json
azure-sentinel-canary[bot] Mar 2, 2023
71658fc
Exported file: Duplicate Rule DisplayName 1.json.json
azure-sentinel-canary[bot] Mar 2, 2023
45fc83a
Exported file: Email access via active sync.json.json
azure-sentinel-canary[bot] Mar 2, 2023
8c92b0d
Exported file: Excessive Amount of Denied Connections from a Single S…
azure-sentinel-canary[bot] Mar 2, 2023
d167d23
Exported file: Excessive Denied Proxy Traffic.json.json
azure-sentinel-canary[bot] Mar 2, 2023
65ed46b
Exported file: Excessive Failed Authentication from Invalid Inputs.js…
azure-sentinel-canary[bot] Mar 2, 2023
bf43038
Exported file: Excessive NXDOMAIN DNS Queries (Normalized DNS).json.json
azure-sentinel-canary[bot] Mar 2, 2023
f11018d
Exported file: Excessive NXDOMAIN DNS Queries.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ed01529
Exported file: Excessive Windows logon failures.json.json
azure-sentinel-canary[bot] Mar 2, 2023
e28d581
Exported file: Excessive number of failed connections from a single s…
azure-sentinel-canary[bot] Mar 2, 2023
081b9f7
Exported file: Exchange AuditLog disabled.json.json
azure-sentinel-canary[bot] Mar 2, 2023
bf2875a
Exported file: Exchange OAB Virtual Directory Attribute Containing Po…
azure-sentinel-canary[bot] Mar 2, 2023
d4cf25d
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection (1).…
azure-sentinel-canary[bot] Mar 2, 2023
9ee6e69
Exported file: Exchange SSRF Autodiscover ProxyShell - Detection.json…
azure-sentinel-canary[bot] Mar 2, 2023
30f7934
Exported file: Exchange Server Vulnerabilities Disclosed March 2021 I…
azure-sentinel-canary[bot] Mar 2, 2023
cb802ea
Exported file: Exchange workflow MailItemsAccessed operation anomaly.…
azure-sentinel-canary[bot] Mar 2, 2023
b2b4439
Exported file: Explicit MFA Deny.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ec4b569
Exported file: External Upstream Source Added to Azure DevOps Feed.js…
azure-sentinel-canary[bot] Mar 2, 2023
d975e82
Exported file: External User Access Enabled.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d4134c5
Exported file: External guest invitations by default guest followed b…
azure-sentinel-canary[bot] Mar 2, 2023
2ff5f77
Exported file: External user added and removed in short timeframe.jso…
azure-sentinel-canary[bot] Mar 2, 2023
ad0d358
Exported file: Failed AWS Console logons but success logon to AzureAD…
azure-sentinel-canary[bot] Mar 2, 2023
2f0cf51
Exported file: Failed AzureAD logons but success logon to AWS Console…
azure-sentinel-canary[bot] Mar 2, 2023
3e78865
Exported file: Failed AzureAD logons but success logon to host.json.json
azure-sentinel-canary[bot] Mar 2, 2023
fc5b4fa
Exported file: Failed Logins from Unknown or Invalid User.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d7b7d05
Exported file: Failed host logons but success logon to AzureAD.json.json
azure-sentinel-canary[bot] Mar 2, 2023
7654a09
Exported file: Failed login attempts to Azure Portal.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3ac72a1
Exported file: Failed logon attempts by valid accounts within 10 mins…
azure-sentinel-canary[bot] Mar 2, 2023
f451051
Exported file: Failed logon attempts in authpriv.json.json
azure-sentinel-canary[bot] Mar 2, 2023
490076a
Exported file: First access credential added to Application or Servic…
azure-sentinel-canary[bot] Mar 2, 2023
67e549e
Exported file: Fortinet - Beacon pattern detected.json.json
azure-sentinel-canary[bot] Mar 2, 2023
659b57f
Exported file: Full Admin policy created and then attached to Roles, …
azure-sentinel-canary[bot] Mar 2, 2023
7908cd7
Exported file: Gain Code Execution on ADFS Server via Remote WMI Exec…
azure-sentinel-canary[bot] Mar 2, 2023
0ae9e22
Exported file: Gain Code Execution on ADFS Server via SMB + Remote Se…
azure-sentinel-canary[bot] Mar 2, 2023
c5758bf
Exported file: GitHub Activites from a New Country.json.json
azure-sentinel-canary[bot] Mar 2, 2023
39e7136
Exported file: GitHub Security Vulnerability in Repository.json.json
azure-sentinel-canary[bot] Mar 2, 2023
fefa46e
Exported file: GitHub Signin Burst from Multiple Locations.json.json
azure-sentinel-canary[bot] Mar 2, 2023
71534b5
Exported file: GitHub Two Factor Auth Disable.json.json
azure-sentinel-canary[bot] Mar 2, 2023
2d75dbc
Exported file: Group created then added to built in domain local or g…
azure-sentinel-canary[bot] Mar 2, 2023
c15fdc3
Exported file: HAFNIUM New UM Service Child Process.json.json
azure-sentinel-canary[bot] Mar 2, 2023
8191186
Exported file: HAFNIUM Suspicious Exchange Request.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3c808ed
Exported file: HAFNIUM Suspicious File Downloads_.json.json
azure-sentinel-canary[bot] Mar 2, 2023
123dfa1
Exported file: HAFNIUM Suspicious UM Service Error.json.json
azure-sentinel-canary[bot] Mar 2, 2023
c2f2c26
Exported file: HAFNIUM UM Service writing suspicious file.json.json
azure-sentinel-canary[bot] Mar 2, 2023
7c7693c
Exported file: High Number of Urgent Vulnerabilities Detected (1).jso…
azure-sentinel-canary[bot] Mar 2, 2023
f937209
Exported file: High Number of Urgent Vulnerabilities Detected.json.json
azure-sentinel-canary[bot] Mar 2, 2023
b5c1f88
Exported file: High Urgency Cyberpion Action Items.json.json
azure-sentinel-canary[bot] Mar 2, 2023
4d1ec18
Exported file: High count of connections by client IP on many ports.j…
azure-sentinel-canary[bot] Mar 2, 2023
475829e
Exported file: High count of failed attempts from same client IP.json…
azure-sentinel-canary[bot] Mar 2, 2023
00d00ed
Exported file: High count of failed logons by a user.json.json
azure-sentinel-canary[bot] Mar 2, 2023
96f6c11
Exported file: IP with multiple failed Azure AD logins successfully l…
azure-sentinel-canary[bot] Mar 2, 2023
b58e262
Exported file: Known Barium IP.json.json
azure-sentinel-canary[bot] Mar 2, 2023
1d564fc
Exported file: Known Barium domains.json.json
azure-sentinel-canary[bot] Mar 2, 2023
c0d46a2
Exported file: Known CERIUM domains and hashes.json.json
azure-sentinel-canary[bot] Mar 2, 2023
140d0b1
Exported file: Known GALLIUM domains and hashes.json.json
azure-sentinel-canary[bot] Mar 2, 2023
cd49cf4
Exported file: Known IRIDIUM IP.json.json
azure-sentinel-canary[bot] Mar 2, 2023
b18ef48
Exported file: Known Malware Detected.json.json
azure-sentinel-canary[bot] Mar 2, 2023
544e5fe
Exported file: Known Manganese IP and UserAgent activity.json.json
azure-sentinel-canary[bot] Mar 2, 2023
9973722
Exported file: Known NICKEL domains and hashes.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ec7f46f
Exported file: Known PHOSPHORUS group domains_IP - October 2020.json.…
azure-sentinel-canary[bot] Mar 2, 2023
4185e2d
Exported file: Known Phosphorus group domains_IP.json.json
azure-sentinel-canary[bot] Mar 2, 2023
98364e8
Exported file: Known STRONTIUM group domains - July 2019.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d5257ff
Exported file: Known ZINC Comebacker and Klackring malware hashes.jso…
azure-sentinel-canary[bot] Mar 2, 2023
bce458a
Exported file: Known ZINC related maldoc hash.json.json
azure-sentinel-canary[bot] Mar 2, 2023
2d61c19
Exported file: Linked Malicious Storage Artifacts.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3f9c9ac
Exported file: Log4j vulnerability exploit aka Log4Shell IP IOC.json.…
azure-sentinel-canary[bot] Mar 2, 2023
138eb98
Exported file: Login to AWS Management Console without MFA.json.json
azure-sentinel-canary[bot] Mar 2, 2023
2ca657c
Exported file: MFA Rejected by User.json.json
azure-sentinel-canary[bot] Mar 2, 2023
c570184
Exported file: MFA disabled for a user.json.json
azure-sentinel-canary[bot] Mar 2, 2023
6117920
Exported file: MSHTML vulnerability CVE-2021-40444 attack.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d26389f
Exported file: Mail redirect via ExO transport rule.json.json
azure-sentinel-canary[bot] Mar 2, 2023
68f6e7b
Exported file: Mail.Read Permissions Granted to Application.json.json
azure-sentinel-canary[bot] Mar 2, 2023
7f8feb5
Exported file: Malformed user agent.json.json
azure-sentinel-canary[bot] Mar 2, 2023
c42529a
Exported file: Malicious Inbox Rule.json.json
azure-sentinel-canary[bot] Mar 2, 2023
c2ae8cd
Exported file: Malicious web application requests linked with Microso…
azure-sentinel-canary[bot] Mar 2, 2023
805d725
Exported file: Malware in the recycle bin (Normalized Process Events)…
azure-sentinel-canary[bot] Mar 2, 2023
86a0951
Exported file: Malware in the recycle bin.json.json
azure-sentinel-canary[bot] Mar 2, 2023
6c31a33
Exported file: Mass secret retrieval from Azure Key Vault.json.json
azure-sentinel-canary[bot] Mar 2, 2023
0c98300
Exported file: Microsoft COVID-19 file hash indicator matches.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ebe6f6a
Exported file: Modified domain federation trust settings.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3a310b2
Exported file: Monitor AWS Credential abuse or hijacking.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3f367b8
Exported file: Multiple Password Reset by user.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3296db5
Exported file: Multiple RDP connections from Single System.json.json
azure-sentinel-canary[bot] Mar 2, 2023
bf9b455
Exported file: Multiple Teams deleted by a single user.json.json
azure-sentinel-canary[bot] Mar 2, 2023
f659901
Exported file: Multiple users email forwarded to same destination.jso…
azure-sentinel-canary[bot] Mar 2, 2023
5c86d50
Exported file: NOBELIUM - Domain and IP IOCs - March 2021.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ce7b7c9
Exported file: NOBELIUM - Domain, Hash and IP IOCs - May 2021.json.json
azure-sentinel-canary[bot] Mar 2, 2023
9729c45
Exported file: NOBELIUM - Script payload stored in Registry.json.json
azure-sentinel-canary[bot] Mar 2, 2023
7c7777d
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Mar 2, 2023
6021efa
Exported file: NOBELIUM - suspicious rundll32.exe execution of vbscri…
azure-sentinel-canary[bot] Mar 2, 2023
8f25c0e
Exported file: NOBELIUM IOCs related to FoggyWeb backdoor.json.json
azure-sentinel-canary[bot] Mar 2, 2023
4f72910
Exported file: Network endpoint to host executable correlation.json.json
azure-sentinel-canary[bot] Mar 2, 2023
71895e5
Exported file: New Agent Added to Pool by New User or Added to a New …
azure-sentinel-canary[bot] Mar 2, 2023
428dace
Exported file: New CloudShell User.json.json
azure-sentinel-canary[bot] Mar 2, 2023
1efcef8
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Mar 2, 2023
a0e1be4
Exported file: New High Severity Vulnerability Detected Across Multip…
azure-sentinel-canary[bot] Mar 2, 2023
27a8038
Exported file: New PA, PCA, or PCAS added to Azure DevOps.json.json
azure-sentinel-canary[bot] Mar 2, 2023
33d7087
Exported file: New UserAgent observed in last 24 hours.json.json
azure-sentinel-canary[bot] Mar 2, 2023
11ed20c
Exported file: New access credential added to Application or Service …
azure-sentinel-canary[bot] Mar 2, 2023
8ee5dae
Exported file: New executable via Office FileUploaded Operation.json.…
azure-sentinel-canary[bot] Mar 2, 2023
a3f14aa
Exported file: New internet-exposed SSH endpoints.json.json
azure-sentinel-canary[bot] Mar 2, 2023
2256233
Exported file: New user created and added to the built-in administrat…
azure-sentinel-canary[bot] Mar 2, 2023
b128dd9
Exported file: Non Domain Controller Active Directory Replication.jso…
azure-sentinel-canary[bot] Mar 2, 2023
189bc31
Exported file: OMI Vulnerability Exploitation.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d161ce3
Exported file: Office policy tampering.json.json
azure-sentinel-canary[bot] Mar 2, 2023
2d48db0
Exported file: PIM Elevation Request Rejected.json.json
azure-sentinel-canary[bot] Mar 2, 2023
71a3a5c
Exported file: Palo Alto - possible internal to external port scannin…
azure-sentinel-canary[bot] Mar 2, 2023
1f8217e
Exported file: Palo Alto - potential beaconing detected.json.json
azure-sentinel-canary[bot] Mar 2, 2023
35baa4e
Exported file: Password spray attack against Azure AD application.jso…
azure-sentinel-canary[bot] Mar 2, 2023
eb965fe
Exported file: Port Scan Detected.json.json
azure-sentinel-canary[bot] Mar 2, 2023
092da9c
Exported file: Possible STRONTIUM attempted credential harvesting - O…
azure-sentinel-canary[bot] Mar 2, 2023
5ff678b
Exported file: Possible STRONTIUM attempted credential harvesting - S…
azure-sentinel-canary[bot] Mar 2, 2023
e205e71
Exported file: Possible contact with a domain generated by a DGA.json…
azure-sentinel-canary[bot] Mar 2, 2023
2e2fac3
Exported file: Potential Build Process Compromise - MDE.json.json
azure-sentinel-canary[bot] Mar 2, 2023
b12066c
Exported file: Potential Build Process Compromise.json.json
azure-sentinel-canary[bot] Mar 2, 2023
69aebac
Exported file: Potential DGA detected (ASimDNS).json.json
azure-sentinel-canary[bot] Mar 2, 2023
ef1494d
Exported file: Potential DGA detected.json.json
azure-sentinel-canary[bot] Mar 2, 2023
0b2ceb5
Exported file: Potential DHCP Starvation Attack.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d5cf964
Exported file: Potential Kerberoasting.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3982a66
Exported file: Potential Password Spray Attack (Uses Authentication N…
azure-sentinel-canary[bot] Mar 2, 2023
b227606
Exported file: Potential Password Spray Attack.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ac3ae87
Exported file: Powershell Empire cmdlets seen in command line.json.json
azure-sentinel-canary[bot] Mar 2, 2023
424b14c
Exported file: Privileged Accounts - Sign in Failure Spikes.json.json
azure-sentinel-canary[bot] Mar 2, 2023
63b0c61
Exported file: Privileged Role Assigned Outside PIM.json.json
azure-sentinel-canary[bot] Mar 2, 2023
72a1f0a
Exported file: Probable AdFind Recon Tool Usage (Normalized Process E…
azure-sentinel-canary[bot] Mar 2, 2023
85b4c60
Exported file: Probable AdFind Recon Tool Usage.json.json
azure-sentinel-canary[bot] Mar 2, 2023
09d3142
Exported file: Process executed from binary hidden in Base64 encoded …
azure-sentinel-canary[bot] Mar 2, 2023
63b68ff
Exported file: Process execution frequency anomaly.json.json
azure-sentinel-canary[bot] Mar 2, 2023
8291c37
Exported file: ProofpointPOD - Binary file in attachment.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ff2520f
Exported file: ProofpointPOD - Email sender IP in TI list.json.json
azure-sentinel-canary[bot] Mar 2, 2023
9cc406d
Exported file: ProofpointPOD - Email sender in TI list.json.json
azure-sentinel-canary[bot] Mar 2, 2023
495ae51
Exported file: ProofpointPOD - High risk message not discarded.json.json
azure-sentinel-canary[bot] Mar 2, 2023
5f58715
Exported file: ProofpointPOD - Multiple archived attachments to the s…
azure-sentinel-canary[bot] Mar 2, 2023
afc9fde
Exported file: ProofpointPOD - Multiple large emails to the same reci…
azure-sentinel-canary[bot] Mar 2, 2023
9526022
Exported file: ProofpointPOD - Multiple protected emails to unknown r…
azure-sentinel-canary[bot] Mar 2, 2023
64d9150
Exported file: ProofpointPOD - Possible data exfiltration to private …
azure-sentinel-canary[bot] Mar 2, 2023
bbf2d50
Exported file: ProofpointPOD - Suspicious attachment.json.json
azure-sentinel-canary[bot] Mar 2, 2023
8233a30
Exported file: ProofpointPOD - Weak ciphers.json.json
azure-sentinel-canary[bot] Mar 2, 2023
e5f493f
Exported file: PulseConnectSecure - Large Number of Distinct Failed U…
azure-sentinel-canary[bot] Mar 2, 2023
e80a8e8
Exported file: PulseConnectSecure - Potential Brute Force Attempts.js…
azure-sentinel-canary[bot] Mar 2, 2023
0500883
Exported file: RDP Nesting.json.json
azure-sentinel-canary[bot] Mar 2, 2023
52257ab
Exported file: Rare RDP Connections.json.json
azure-sentinel-canary[bot] Mar 2, 2023
631c502
Exported file: Rare and potentially high-risk Office operations.json.…
azure-sentinel-canary[bot] Mar 2, 2023
db82d36
Exported file: Rare application consent.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ae9a564
Exported file: Rare client observed with high reverse DNS lookup coun…
azure-sentinel-canary[bot] Mar 2, 2023
fed9595
Exported file: Rare subscription-level operations in Azure.json.json
azure-sentinel-canary[bot] Mar 2, 2023
be901eb
Exported file: Request for single resource on domain.json.json
azure-sentinel-canary[bot] Mar 2, 2023
035ac93
Exported file: SOURGUM Actor IOC - July 2021.json.json
azure-sentinel-canary[bot] Mar 2, 2023
4ebb42d
Exported file: SSH - Potential Brute Force.json.json
azure-sentinel-canary[bot] Mar 2, 2023
7be3376
Exported file: SUNBURST and SUPERNOVA backdoor hashes (Normalized Fil…
azure-sentinel-canary[bot] Mar 2, 2023
eb645d8
Exported file: SUNBURST and SUPERNOVA backdoor hashes.json.json
azure-sentinel-canary[bot] Mar 2, 2023
488149f
Exported file: SUNBURST network beacons.json.json
azure-sentinel-canary[bot] Mar 2, 2023
e8079ac
Exported file: SUNBURST suspicious SolarWinds child processes (Normal…
azure-sentinel-canary[bot] Mar 2, 2023
d988075
Exported file: SUNBURST suspicious SolarWinds child processes.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ce03d91
Exported file: SUNSPOT log file creation.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3609f15
Exported file: SUNSPOT malware hashes.json.json
azure-sentinel-canary[bot] Mar 2, 2023
606a5fa
Exported file: SUPERNOVA webshell.json.json
azure-sentinel-canary[bot] Mar 2, 2023
fea6aed
Exported file: Security Event log cleared.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3cb3e7a
Exported file: Security Service Registry ACL Modification.json.json
azure-sentinel-canary[bot] Mar 2, 2023
fff0b6b
Exported file: SecurityEvent - Multiple authentication failures follo…
azure-sentinel-canary[bot] Mar 2, 2023
f4f5c77
Exported file: Sensitive Azure Key Vault operations.json.json
azure-sentinel-canary[bot] Mar 2, 2023
2fc9ec8
Exported file: Several deny actions registered.json.json
azure-sentinel-canary[bot] Mar 2, 2023
421d1fb
Exported file: SharePointFileOperation via devices with previously un…
azure-sentinel-canary[bot] Mar 2, 2023
ce91488
Exported file: SharePointFileOperation via previously unseen IPs.json…
azure-sentinel-canary[bot] Mar 2, 2023
0e6de71
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Mar 2, 2023
9838a1f
Exported file: Sign-ins from IPs that attempt sign-ins to disabled ac…
azure-sentinel-canary[bot] Mar 2, 2023
7520994
Exported file: Solorigate Defender Detections.json.json
azure-sentinel-canary[bot] Mar 2, 2023
6374a0a
Exported file: Solorigate Domains Found in VM Insights.json.json
azure-sentinel-canary[bot] Mar 2, 2023
f4fc147
Exported file: Solorigate Named Pipe.json.json
azure-sentinel-canary[bot] Mar 2, 2023
3b64e87
Exported file: Solorigate Network Beacon.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ff87c34
Exported file: Squid proxy events for ToR proxies.json.json
azure-sentinel-canary[bot] Mar 2, 2023
9e2c4e6
Exported file: Squid proxy events related to mining pools.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ba12c2a
Exported file: Starting or Stopping HealthService to Avoid Detection.…
azure-sentinel-canary[bot] Mar 2, 2023
79ad478
Exported file: Successful SSH brute force attack.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d999197
Exported file: Successful logon from IP and failure from a different …
azure-sentinel-canary[bot] Mar 2, 2023
e764bbb
Exported file: Suspicious Resource deployment.json.json
azure-sentinel-canary[bot] Mar 2, 2023
59de7c7
Exported file: Suspicious Service Principal creation activity.json.json
azure-sentinel-canary[bot] Mar 2, 2023
a17f2ec
Exported file: Suspicious application consent for offline access.json…
azure-sentinel-canary[bot] Mar 2, 2023
98154cc
Exported file: Suspicious application consent similar to O365 Attack …
azure-sentinel-canary[bot] Mar 2, 2023
cedc1b1
Exported file: Suspicious application consent similar to PwnAuth.json…
azure-sentinel-canary[bot] Mar 2, 2023
1e7f4df
Exported file: Suspicious granting of permissions to an account.json.…
azure-sentinel-canary[bot] Mar 2, 2023
e7d78ab
Exported file: Suspicious link sharing pattern.json.json
azure-sentinel-canary[bot] Mar 2, 2023
1055cde
Exported file: Suspicious number of resource creation or deployment a…
azure-sentinel-canary[bot] Mar 2, 2023
86c0e11
Exported file: TEARDROP memory-only dropper.json.json
azure-sentinel-canary[bot] Mar 2, 2023
b5992b3
Exported file: THALLIUM domains included in DCU takedown.json.json
azure-sentinel-canary[bot] Mar 2, 2023
34003c7
Exported file: TI map Domain entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Mar 2, 2023
9125933
Exported file: TI map Domain entity to DnsEvent.json.json
azure-sentinel-canary[bot] Mar 2, 2023
96dbb73
Exported file: TI map Domain entity to PaloAlto.json.json
azure-sentinel-canary[bot] Mar 2, 2023
b02d24d
Exported file: TI map Domain entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Mar 2, 2023
fe16748
Exported file: TI map Domain entity to Syslog.json.json
azure-sentinel-canary[bot] Mar 2, 2023
94da167
Exported file: TI map Email entity to AzureActivity.json.json
azure-sentinel-canary[bot] Mar 2, 2023
1c79327
Exported file: TI map Email entity to CommonSecurityLog.json.json
azure-sentinel-canary[bot] Mar 2, 2023
9f5cbf8
Exported file: TI map Email entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Mar 2, 2023
61b2779
Exported file: TI map Email entity to SecurityAlert.json.json
azure-sentinel-canary[bot] Mar 2, 2023
6c9a87d
Exported file: TI map Email entity to SecurityEvent.json.json
azure-sentinel-canary[bot] Mar 2, 2023
6d28c8e
Exported file: TI map Email entity to SigninLogs.json.json
azure-sentinel-canary[bot] Mar 2, 2023
b173fe4
Exported file: TI map File Hash to CommonSecurityLog Event.json.json
azure-sentinel-canary[bot] Mar 2, 2023
484b8f9
Exported file: TI map File Hash to Security Event.json.json
azure-sentinel-canary[bot] Mar 2, 2023
024c9af
Exported file: TI map IP entity to AWSCloudTrail.json.json
azure-sentinel-canary[bot] Mar 2, 2023
1396376
Exported file: TI map IP entity to AppServiceHTTPLogs.json.json
azure-sentinel-canary[bot] Mar 2, 2023
961d8e5
Exported file: TI map IP entity to Azure Key Vault logs.json.json
azure-sentinel-canary[bot] Mar 2, 2023
988eb83
Exported file: TI map IP entity to Azure SQL Security Audit Events.js…
azure-sentinel-canary[bot] Mar 2, 2023
16c3286
Exported file: TI map IP entity to AzureActivity.json.json
azure-sentinel-canary[bot] Mar 2, 2023
a725cd1
Exported file: TI map IP entity to AzureFirewall.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ef4a801
Exported file: TI map IP entity to AzureNetworkAnalytics_CL (NSG Flow…
azure-sentinel-canary[bot] Mar 2, 2023
84fb089
Exported file: TI map IP entity to DnsEvents.json.json
azure-sentinel-canary[bot] Mar 2, 2023
c3daa45
Exported file: TI map IP entity to Duo Security.json.json
azure-sentinel-canary[bot] Mar 2, 2023
97b48d5
Exported file: TI map IP entity to GitHub_CL.json.json
azure-sentinel-canary[bot] Mar 2, 2023
5695020
Exported file: TI map IP entity to OfficeActivity.json.json
azure-sentinel-canary[bot] Mar 2, 2023
5f99527
Exported file: TI map IP entity to SigninLogs.json.json
azure-sentinel-canary[bot] Mar 2, 2023
4093ccf
Exported file: TI map IP entity to VMConnection.json.json
azure-sentinel-canary[bot] Mar 2, 2023
e9dfffc
Exported file: TI map IP entity to W3CIISLog.json.json
azure-sentinel-canary[bot] Mar 2, 2023
80a58e8
Exported file: TI map IP entity to WireData.json.json
azure-sentinel-canary[bot] Mar 2, 2023
fd64a39
Exported file: TI map URL entity to AuditLogs.json.json
azure-sentinel-canary[bot] Mar 2, 2023
46366e7
Exported file: TI map URL entity to OfficeActivity data.json.json
azure-sentinel-canary[bot] Mar 2, 2023
2cbaf6a
Exported file: TI map URL entity to PaloAlto data.json.json
azure-sentinel-canary[bot] Mar 2, 2023
7662254
Exported file: TI map URL entity to SecurityAlert data.json.json
azure-sentinel-canary[bot] Mar 2, 2023
dd51898
Exported file: TI map URL entity to Syslog data.json.json
azure-sentinel-canary[bot] Mar 2, 2023
852c596
Exported file: Threats detected by Eset.json.json
azure-sentinel-canary[bot] Mar 2, 2023
6e2082a
Exported file: Time series anomaly detection for total volume of traf…
azure-sentinel-canary[bot] Mar 2, 2023
fd335c2
Exported file: Time series anomaly for data size transferred to publi…
azure-sentinel-canary[bot] Mar 2, 2023
1c3ddc7
Exported file: Trust Monitor Event.json.json
azure-sentinel-canary[bot] Mar 2, 2023
1247cce
Exported file: User Accessed Suspicious URL Categories.json.json
azure-sentinel-canary[bot] Mar 2, 2023
2867113
Exported file: User Accounts - Sign in Failure due to CA Spikes.json.…
azure-sentinel-canary[bot] Mar 2, 2023
b5cf544
Exported file: User Assigned Privileged Role.json.json
azure-sentinel-canary[bot] Mar 2, 2023
c9c92c2
Exported file: User Login from Different Countries within 3 hours.jso…
azure-sentinel-canary[bot] Mar 2, 2023
f8deb38
Exported file: User account added to built in domain local or global …
azure-sentinel-canary[bot] Mar 2, 2023
8b5ce39
Exported file: User account created and deleted within 10 mins.json.json
azure-sentinel-canary[bot] Mar 2, 2023
a78217d
Exported file: User account enabled and disabled within 10 mins.json.…
azure-sentinel-canary[bot] Mar 2, 2023
eb4c4f5
Exported file: User added to Azure Active Directory Privileged Groups…
azure-sentinel-canary[bot] Mar 2, 2023
3b45cfc
Exported file: User agent search for log4j exploitation attempt.json.…
azure-sentinel-canary[bot] Mar 2, 2023
59cf4ab
Exported file: User joining Zoom meeting from suspicious timezone.jso…
azure-sentinel-canary[bot] Mar 2, 2023
731c474
Exported file: User login from different countries within 3 hours (Us…
azure-sentinel-canary[bot] Mar 2, 2023
5cdb287
Exported file: Users searching for VIP user activity.json.json
azure-sentinel-canary[bot] Mar 2, 2023
ca617ae
Exported file: Valid Analytic Rule 1.json.json
azure-sentinel-canary[bot] Mar 2, 2023
7e28751
Exported file: Vectra AI Detect - Detections with High Severity.json.…
azure-sentinel-canary[bot] Mar 2, 2023
a7640dc
Exported file: Vectra AI Detect - New Campaign Detected.json.json
azure-sentinel-canary[bot] Mar 2, 2023
8f2a392
Exported file: Vectra AI Detect - Suspected Compromised Account.json.…
azure-sentinel-canary[bot] Mar 2, 2023
27ecccc
Exported file: Vectra AI Detect - Suspected Compromised Host.json.json
azure-sentinel-canary[bot] Mar 2, 2023
6feff51
Exported file: Vectra AI Detect - Suspicious Behaviors.json.json
azure-sentinel-canary[bot] Mar 2, 2023
6ee12b7
Exported file: Vulnerable Machines related to OMIGOD CVE-2021-38647.j…
azure-sentinel-canary[bot] Mar 2, 2023
b923b83
Exported file: Vulnerable Machines related to log4j CVE-2021-44228.js…
azure-sentinel-canary[bot] Mar 2, 2023
0c25d2c
Exported file: Wazuh - Large Number of Web errors from an IP.json.json
azure-sentinel-canary[bot] Mar 2, 2023
4d74629
Exported file: Web sites blocked by Eset.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d6a8a14
Exported file: Zoom E2E Encryption Disabled.json.json
azure-sentinel-canary[bot] Mar 2, 2023
780ff48
Exported file: new file added -- 2_14_2013.json.json
azure-sentinel-canary[bot] Mar 2, 2023
d77461f
Exported file: new test rule 1.json.json
azure-sentinel-canary[bot] Mar 2, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/fcd7bae2-0354-454d-9884-18880ff95fe8')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "ThreatIntelligence",
"apiVersion": "2022-09-01-preview",
"properties": {
"alertRuleTemplateName": "0dd422ee-e6af-4204-b219-f59ac172e4c6",
"severity": "Medium",
"tactics": [
"Persistence",
"LateralMovement"
],
"techniques": [],
"displayName": "(Preview) Microsoft Threat Intelligence Analytics",
"enabled": true,
"description": "This rule generates an alert when a Microsoft Threat Intelligence Indicator gets matched with your event logs. The alerts are very high fidelity and are turned ON by default. \n\nNote : It is advised to turn off any custom alert rules which match the threat intelligence indicators with the same event logs matched by this analytics to prevent duplicate alerts."
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/516cc0be-cc97-486b-928e-0e222352ba46')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/516cc0be-cc97-486b-928e-0e222352ba46')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet DomainTIs= ThreatIntelligenceIndicator\n | where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n // Picking up only IOC's that contain the entities we want\n | where isnotempty(DomainName)\n | where Active == true\n | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId;\nlet Domains= toscalar(DomainTIs | where isnotempty(DomainName) |summarize make_set(DomainName));\nDomainTIs\n | join (\n imDns(starttime=ago(dt_lookBack), domain_has_any=(Domains))\n | extend DNS_TimeGenerated = TimeGenerated\n) on $left.DomainName==$right.DnsQuery\n| where DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, Url, DNS_TimeGenerated, Dvc, SrcIpAddr, DnsQuery, QueryType\n| extend timestamp = DNS_TimeGenerated, HostCustomEntity = Dvc, IPCustomEntity = SrcIpAddr, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map Domain entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any Domain IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "999e9f5d-db4a-4b07-a206-29c4e667b7e8"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/8fb31b17-e360-4b59-a281-19c4fe483909')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT1H",
"queryPeriod": "P14D",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"severity": "Medium",
"query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet IP_TI = (ThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n// As there is potentially more than 1 indicator type for matching IP, taking NetworkIP first, then others if that is empty.\n// Taking the first non-empty value based on potential IOC match availability\n| extend TI_ipEntity = coalesce(NetworkIP, NetworkDestinationIP, NetworkSourceIP,EmailSourceIpAddress,\"\")\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId);\nlet TI_IP_List=IP_TI | summarize make_set( TI_ipEntity);\nimDns(starttime=ago(dt_lookBack), response_has_any_prefix=todynamic(toscalar(TI_IP_List)))\n | extend tilist = toscalar(TI_IP_List)\n | mv-expand tilist\n | extend SingleIP=tostring(tilist)\n | project-away tilist\n | where has_ipv4(DnsResponseName, SingleIP)\n | extend DNS_TimeGenerated = TimeGenerated\n| join IP_TI\n on $left.SingleIP == $right.TI_ipEntity\n| where DNS_TimeGenerated >= TimeGenerated and DNS_TimeGenerated < ExpirationDateTime\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore, DNS_TimeGenerated,\nTI_ipEntity, Dvc, EventId, SubType, SrcIpAddr, DnsQuery, DnsResponseName, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress\n| extend timestamp = DNS_TimeGenerated, IPCustomEntity = TI_ipEntity, HostCustomEntity = Dvc, URLCustomEntity = Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"entityMappings": [
{
"entityType": "Host",
"fieldMappings": [
{
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
},
{
"entityType": "IP",
"fieldMappings": [
{
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"identifier": "Url",
"columnName": "URLCustomEntity"
}
]
}
],
"tactics": [
"Impact"
],
"techniques": null,
"displayName": "(Preview) TI map IP entity to Dns Events (Normalized DNS)",
"enabled": false,
"description": "Identifies a match in DNS events from any IP IOC from TI\nTo use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/AzSentinelDns).",
"alertRuleTemplateName": "67775878-7f8b-4380-ac54-115e1e828901"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/118cc3d5-6ab5-493a-a0a9-793c9dd09875')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT6H",
"queryPeriod": "PT7H",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "SingleAlert"
},
"severity": "High",
"query": "// Rule Name - (Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations\r\n// Rule Description - Sensitive Data Access Outside Organziational Geolocations\r\n// Prerequisite 1: Onboard Azure Infomation Protection (https://docs.microsoft.com/en-us/azure/information-protection/requirements)\r\n// Prerequisite 2: Install AIP Unified Labeling Scanner (https://docs.microsoft.com/en-us/azure/information-protection/tutorial-install-scanner)\r\n// Prerequisite 3: Enable Azure Information Protection Connector (https://docs.microsoft.com/en-us/azure/sentinel/data-connectors-reference#azure-information-protection)\r\n// Prerequisite 4: Enable Azure Active Directory Connector (hhttps://docs.microsoft.com/en-us/azure/sentinel/connect-azure-active-directory)\r\nInformationProtectionLogs_CL\r\n| extend UserPrincipalName = UserId_s\r\n| where LabelName_s <> \"\"\r\n| join (SigninLogs) on UserPrincipalName\r\n| extend City = tostring(LocationDetails.city)\r\n// | where City <> \"New York\" // Configure Location Details within Organizational Requirements\r\n| extend State = tostring(LocationDetails.state)\r\n// | where State <> \"Texas\" // Configure Location Details within Organizational Requirements\r\n| extend Country_Region = tostring(LocationDetails.countryOrRegion)\r\n// | where Country_Region <> \"US\" // Configure Location Details within Organizational Requirements\r\n| summarize count() by UserPrincipalName, LabelName_s, Activity_s, City, State, Country_Region\r\n| sort by count_ desc\r\n| limit 250",
"suppressionDuration": "PT5H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5H",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": [],
"groupByCustomDetails": []
}
},
"customDetails": {
"Activity": "Activity_s",
"Where": "City"
},
"entityMappings": [
{
"entityType": "Account",
"fieldMappings": [
{
"identifier": "AadUserId",
"columnName": "UserPrincipalName"
}
]
}
],
"tactics": [],
"techniques": null,
"displayName": "(Private Preview) Insider Risk Management: Sensitive Data Access Outside Organizational Geolocations",
"enabled": false,
"description": "Sensitive Data Access Outside Organziational Geolocations",
"alertRuleTemplateName": null
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/454abbc9-3d65-4dfb-9446-0af12f681192')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT10M",
"queryPeriod": "PT10M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let default_file_ext_blocklist = dynamic(['.ps1', '.vbs', '.bat', '.scr']);\nlet custom_file_ext_blocklist=toscalar(_GetWatchlist('RiskyFileTypes') | extend Extension=column_ifexists(\"Extension\",\"\") | where isnotempty(Extension) | summarize make_set(Extension));\nlet file_ext_blocklist = array_concat(default_file_ext_blocklist, custom_file_ext_blocklist);\nimWebSession(url_has_any=file_ext_blocklist, eventresult='Success')\n| extend requestedFileName=tostring(split(tostring(parse_url(Url)[\"Path\"]),'/')[-1])\n| extend requestedFileExt=extract(@(\\.\\w+)$,1,requestedFileName, typeof(string))\n| where requestedFileExtension in (file_ext_blocklist)\n| summarize LastAttemptTime=max(TimeGenerated), NumFailedAttempts=count() by SrcIpAddr, requestedFileName, Url\n| extend IPCustomEntity = SrcIpAddr, UrlCustomEntity=Url\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"InitialAccess"
],
"techniques": null,
"displayName": "A client made a web request to a potentially harmful file (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request to a URL that holds a file type, including .ps1, .bat, .vbs, and .scr that can be harmful if downloaded. This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, deploy the Advanced SIEM information Model (ASIM).\nTo use this analytics rule, deploy the [Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM)",
"alertRuleTemplateName": "09c49590-4e9d-4da9-a34d-17222d0c9e7e"
}
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/150bcc1a-7788-4624-a9d9-1b05b0fc7051')]",
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules",
"kind": "Scheduled",
"apiVersion": "2022-09-01-preview",
"properties": {
"queryFrequency": "PT15M",
"queryPeriod": "PT15M",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0,
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"severity": "Medium",
"query": "let threatCategory=\"Powershell\";\nlet knownUserAgentsIndicators = materialize(externaldata(UserAgent:string, Category:string)\n [ @\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/UnusualUserAgents.csv\"] \n with(format=\"csv\", ignoreFirstRecord=True));\nlet knownUserAgents=toscalar(knownUserAgentsIndicators | where Category==threatCategory | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet customUserAgents=toscalar(_GetWatchlist(\"UnusualUserAgents\") | where SearchKey==threatCategory | extend UserAgent=column_ifexists(\"UserAgent\",\"\") | where isnotempty(UserAgent) | summarize make_list(UserAgent));\nlet fullUAList = array_concat(knownUserAgents,customUserAgents);\nimWebSession(httpuseragent_has_any=fullUAList)\n| project SrcIpAddr, Url, TimeGenerated,HttpUserAgent, SrcUsername\n",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"incidentConfiguration": {
"createIncident": true,
"groupingConfiguration": {
"enabled": false,
"reopenClosedIncident": false,
"lookbackDuration": "PT5M",
"matchingMethod": "AllEntities",
"groupByEntities": [],
"groupByAlertDetails": null,
"groupByCustomDetails": null
}
},
"tactics": [
"CommandAndControl",
"DefenseEvasion"
],
"techniques": null,
"displayName": "A host is potentially running PowerShell to send HTTP(S) requests (ASIM Web Session schema)",
"enabled": false,
"description": "This rule identifies a web request with a user agent header known to belong PowerShell. <br>You can add custom Powershell indicating User-Agent headers using a watchlist, for more information refer to the [UnusualUserAgents Watchlist](https://aka.ms/ASimUnusualUserAgentsWatchlist).<br><br>This rule uses the [Advanced SIEM Information Model (ASIM)](https://aka.ms/AboutASIM) and supports any web session source that complies with ASIM. To use this Analytics Rule, [deploy the Advanced SIEM information Model (ASIM)](https://aka.ms/DeployASIM).",
"alertRuleTemplateName": "42436753-9944-4d70-801c-daaa4d19ddd2"
}
}
]
}
Loading