Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Vulnerability

Back
Id0e0cdda9-4536-4cc9-91cf-736e8957ed26
RulenameCyble Vision Alerts Vulnerability
DescriptionDetects SSL/TLS and application vulnerabilities from CybleVision. Extracts host, IP, port, severity, vulnerability ID and first-seen metadata using the Alerts_Vulnerability parser. Incidents grouped per service.
SeverityLow
TacticsReconnaissance
Execution
Discovery
TechniquesT1595
T1203
T1046
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Vulnerability.yaml
Version1.0.0
Arm template0e0cdda9-4536-4cc9-91cf-736e8957ed26.json
Deploy To Azure
Alerts_vulnerability 
| where Service == "vulnerability" 
| extend MappedSeverity = Severity
name: Cyble Vision Alerts Vulnerability
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Vulnerability {{V_Title}}
  alertDescriptionFormat: |
        A vulnerability was detected for host {{V_Host}} (IP {{V_IP}}, Port {{V_Port}}).
query: |
  Alerts_vulnerability 
  | where Service == "vulnerability" 
  | extend MappedSeverity = Severity  
id: 0e0cdda9-4536-4cc9-91cf-736e8957ed26
enabled: true
entityMappings:
- fieldMappings:
  - columnName: V_Host
    identifier: HostName
  entityType: Host
- fieldMappings:
  - columnName: V_IP
    identifier: Address
  entityType: IP
version: 1.0.0
triggerOperator: GreaterThan
suppressionDuration: PT5H
description: |
    'Detects SSL/TLS and application vulnerabilities from CybleVision. Extracts host, IP, port, severity, vulnerability ID and first-seen metadata using the Alerts_Vulnerability parser. Incidents grouped per service.'
kind: Scheduled
queryFrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Vulnerability.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
subTechniques: []
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  AlertID: AlertID
  Title: V_Title
  V_VulnID: V_VulnID
  V_FirstSeen: V_FirstSeen
  V_Confidence: V_Confidence
  V_Type: V_Type
  Service: Service
  V_Port: V_Port
  Status: Status
  MappedSeverity: Severity
  V_LastSeen: V_LastSeen
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1595
- T1203
- T1046
tactics:
- Reconnaissance
- Execution
- Discovery