Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Create Incident for XDR Alerts

Back
Id0febd8cc-1b8d-45ed-87b3-e1e8a57d14cd
RulenameCreate Incident for XDR Alerts
DescriptionThis Query creates an incident based on Trend Vision One Workbench Alerts and maps the impacted entities for Microsoft Sentinel usage.
SeverityHigh
Required data connectorsTrendMicroXDR
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Trend Micro Vision One/Analytic Rules/Create Incident for XDR Alerts.yaml
Version1.0.3
Arm template0febd8cc-1b8d-45ed-87b3-e1e8a57d14cd.json
Deploy To Azure
TrendMicro_XDR_WORKBENCH_CL
| extend Severity = case(severity_s == "low", "Informational",
                        severity_s == "medium", "Low",
                        severity_s == "high", "Medium",
                        "High"
                        )
| extend 
    UserAccountName_s = todynamic(UserAccountName_s)[0],
    UserAccountNTDomain_s = todynamic(UserAccountNTDomain_s)[0],
    FileName_s = todynamic(FileName_s)[0],
    FileDirectory_s = todynamic(FileDirectory_s)[0],
    ProcessCommandLine_s = todynamic(ProcessCommandLine_s)[0],
    RegistryKey_s = todynamic(RegistryKey_s)[0],
    RegistryValue_s = todynamic(RegistryValue_s)[0],
    RegistryValueName_s = todynamic(RegistryValueName_s)[0]
customDetails:
  ImpactScopeSummary: impactScope_Summary_s
  Severity: severity_s
  PriorityScore: priorityScore_d
  WorkbenchID: workbenchId_s
  WorkbenchName: workbenchName_s
  WorkbenchLink: workbenchLink_s
  XDRCustomerID: xdrCustomerID_g
  CreatedAt: createdTime_t
  Provider: alertProvider_s
triggerOperator: gt
suppressionDuration: 5h
queryFrequency: 5m
description: |
    'This Query creates an incident based on Trend Vision One Workbench Alerts and maps the impacted entities for Microsoft Sentinel usage.'
status: Available
kind: Scheduled
triggerThreshold: 0
requiredDataConnectors:
- connectorId: TrendMicroXDR
  dataTypes:
  - TrendMicro_XDR_WORKBENCH_CL
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    reopenClosedIncident: false
    groupByCustomDetails:
    - WorkbenchID
    groupByEntities: []
    groupByAlertDetails: []
    lookbackDuration: 5m
    matchingMethod: Selected
    enabled: true
version: 1.0.3
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryPeriod: 5m
alertRuleTemplateName: 
name: Create Incident for XDR Alerts
suppressionEnabled: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Trend Micro Vision One/Analytic Rules/Create Incident for XDR Alerts.yaml
id: 0febd8cc-1b8d-45ed-87b3-e1e8a57d14cd
alertDetailsOverride:
  alertTacticsColumnName: 
  alertSeverityColumnName: Severity
  alertDescriptionFormat: '{{description_s}}'
  alertDisplayNameFormat: '{{workbenchName_s}}'
tactics: 
relevantTechniques: 
severity: High
entityMappings:
- fieldMappings:
  - identifier: Name
    columnName: UserAccountName_s
  - identifier: NTDomain
    columnName: UserAccountNTDomain_s
  entityType: Account
- fieldMappings:
  - identifier: Name
    columnName: FileName_s
  - identifier: Directory
    columnName: FileDirectory_s
  entityType: File
- fieldMappings:
  - identifier: CommandLine
    columnName: ProcessCommandLine_s
  entityType: Process
- fieldMappings:
  - identifier: Key
    columnName: RegistryKey_s
  entityType: RegistryKey
- fieldMappings:
  - identifier: Name
    columnName: ProcessCommandLine_s
  - identifier: Value
    columnName: RegistryValue_s
  entityType: RegistryValue
query: |
  TrendMicro_XDR_WORKBENCH_CL
  | extend Severity = case(severity_s == "low", "Informational",
                          severity_s == "medium", "Low",
                          severity_s == "high", "Medium",
                          "High"
                          )
  | extend 
      UserAccountName_s = todynamic(UserAccountName_s)[0],
      UserAccountNTDomain_s = todynamic(UserAccountNTDomain_s)[0],
      FileName_s = todynamic(FileName_s)[0],
      FileDirectory_s = todynamic(FileDirectory_s)[0],
      ProcessCommandLine_s = todynamic(ProcessCommandLine_s)[0],
      RegistryKey_s = todynamic(RegistryKey_s)[0],
      RegistryValue_s = todynamic(RegistryValue_s)[0],
      RegistryValueName_s = todynamic(RegistryValueName_s)[0]  
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2023-02-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/0febd8cc-1b8d-45ed-87b3-e1e8a57d14cd')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/0febd8cc-1b8d-45ed-87b3-e1e8a57d14cd')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "{{description_s}}",
          "alertDisplayNameFormat": "{{workbenchName_s}}",
          "alertSeverityColumnName": "Severity",
          "alertTacticsColumnName": null
        },
        "alertRuleTemplateName": null,
        "customDetails": {
          "CreatedAt": "createdTime_t",
          "ImpactScopeSummary": "impactScope_Summary_s",
          "PriorityScore": "priorityScore_d",
          "Provider": "alertProvider_s",
          "Severity": "severity_s",
          "WorkbenchID": "workbenchId_s",
          "WorkbenchLink": "workbenchLink_s",
          "WorkbenchName": "workbenchName_s",
          "XDRCustomerID": "xdrCustomerID_g"
        },
        "description": "'This Query creates an incident based on Trend Vision One Workbench Alerts and maps the impacted entities for Microsoft Sentinel usage.'\n",
        "displayName": "Create Incident for XDR Alerts",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "Account",
            "fieldMappings": [
              {
                "columnName": "UserAccountName_s",
                "identifier": "Name"
              },
              {
                "columnName": "UserAccountNTDomain_s",
                "identifier": "NTDomain"
              }
            ]
          },
          {
            "entityType": "File",
            "fieldMappings": [
              {
                "columnName": "FileName_s",
                "identifier": "Name"
              },
              {
                "columnName": "FileDirectory_s",
                "identifier": "Directory"
              }
            ]
          },
          {
            "entityType": "Process",
            "fieldMappings": [
              {
                "columnName": "ProcessCommandLine_s",
                "identifier": "CommandLine"
              }
            ]
          },
          {
            "entityType": "RegistryKey",
            "fieldMappings": [
              {
                "columnName": "RegistryKey_s",
                "identifier": "Key"
              }
            ]
          },
          {
            "entityType": "RegistryValue",
            "fieldMappings": [
              {
                "columnName": "ProcessCommandLine_s",
                "identifier": "Name"
              },
              {
                "columnName": "RegistryValue_s",
                "identifier": "Value"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "incidentConfiguration": {
          "createIncident": true,
          "groupingConfiguration": {
            "enabled": true,
            "groupByAlertDetails": [],
            "groupByCustomDetails": [
              "WorkbenchID"
            ],
            "groupByEntities": [],
            "lookbackDuration": "PT5M",
            "matchingMethod": "Selected",
            "reopenClosedIncident": false
          }
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Trend Micro Vision One/Analytic Rules/Create Incident for XDR Alerts.yaml",
        "query": "TrendMicro_XDR_WORKBENCH_CL\n| extend Severity = case(severity_s == \"low\", \"Informational\",\n                        severity_s == \"medium\", \"Low\",\n                        severity_s == \"high\", \"Medium\",\n                        \"High\"\n                        )\n| extend \n    UserAccountName_s = todynamic(UserAccountName_s)[0],\n    UserAccountNTDomain_s = todynamic(UserAccountNTDomain_s)[0],\n    FileName_s = todynamic(FileName_s)[0],\n    FileDirectory_s = todynamic(FileDirectory_s)[0],\n    ProcessCommandLine_s = todynamic(ProcessCommandLine_s)[0],\n    RegistryKey_s = todynamic(RegistryKey_s)[0],\n    RegistryValue_s = todynamic(RegistryValue_s)[0],\n    RegistryValueName_s = todynamic(RegistryValueName_s)[0]\n",
        "queryFrequency": "PT5M",
        "queryPeriod": "PT5M",
        "severity": "High",
        "status": "Available",
        "suppressionDuration": "PT5H",
        "suppressionEnabled": false,
        "tactics": null,
        "techniques": null,
        "templateVersion": "1.0.3",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}