Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Header Content Security Policy Missing

Back
Id0765fa90-1198-4241-960b-975387ac73fa
RulenameHeader: Content Security Policy Missing
DescriptionHeader: Content Security Policy Missing
SeverityHigh
TacticsInitialAccess
TechniquesT1190
T1566
Required data connectorsHVPollingIDAzureFunctions
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/HeaderContentSecurityPolicyMissing.yaml
Version1.0.3
Arm template0765fa90-1198-4241-960b-975387ac73fa.json
Deploy To Azure
HackerViewLog_Azure_1_CL | where severity_s == "high" | where progress_status_s == "New" | where status_s != "inactive"  | where issue_name_s == "Header: Content Security Policy Missing"
query: 'HackerViewLog_Azure_1_CL | where severity_s == "high" | where progress_status_s == "New" | where status_s != "inactive"  | where issue_name_s == "Header: Content Security Policy Missing"'
requiredDataConnectors:
- dataTypes:
  - HackerViewLog_Azure_1_CL
  connectorId: HVPollingIDAzureFunctions
status: Available
name: 'Header: Content Security Policy Missing'
entityMappings:
- fieldMappings:
  - identifier: Address
    columnName: meta_resolved_ip_s
  entityType: IP
- fieldMappings:
  - identifier: HostName
    columnName: meta_host_s
  entityType: Host
- fieldMappings:
  - identifier: Url
    columnName: hackerview_link_s
  entityType: URL
kind: Scheduled
triggerThreshold: 0
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
    reopenClosedIncident: false
queryPeriod: 5m
description: |
    'Header: Content Security Policy Missing'
suppressionDuration: 5h
triggerOperator: gt
suppressionEnabled: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/HeaderContentSecurityPolicyMissing.yaml
version: 1.0.3
queryFrequency: 5m
severity: High
eventGroupingSettings:
  aggregationKind: SingleAlert
tactics:
- InitialAccess
id: 0765fa90-1198-4241-960b-975387ac73fa
relevantTechniques:
- T1190
- T1566