TrendMicro_XDR_WORKBENCH_CL
| extend Severity = case(severity_s == "low", "Informational",
severity_s == "medium", "Low",
severity_s == "high", "Medium",
"High"
)
| extend
UserAccountName_s = todynamic(column_ifexists("UserAccountName_s", "[]")),
UserAccountNTDomain_s = todynamic(column_ifexists("UserAccountNTDomain_s", "[]")),
FileName_s = todynamic(column_ifexists("FileName_s", "[]")),
FileDirectory_s = todynamic(column_ifexists("FileDirectory_s", "[]")),
ProcessCommandLine_s = todynamic(column_ifexists("ProcessCommandLine_s", "[]")),
RegistryKey_s = todynamic(column_ifexists("RegistryKey_s", "[]")),
RegistryValue_s = todynamic(column_ifexists("RegistryValue_s", "[]")),
RegistryValueName_s = todynamic(column_ifexists("RegistryValueName_s", "[]"))
suppressionEnabled: false
description: |
'This Query creates an incident based on Trend Vision One Workbench Alerts and maps the impacted entities for Microsoft Sentinel usage.'
entityMappings:
- entityType: Account
fieldMappings:
- columnName: UserAccountName_s
identifier: Name
- columnName: UserAccountNTDomain_s
identifier: NTDomain
- entityType: File
fieldMappings:
- columnName: FileName_s
identifier: Name
- columnName: FileDirectory_s
identifier: Directory
- entityType: Process
fieldMappings:
- columnName: ProcessCommandLine_s
identifier: CommandLine
- entityType: RegistryKey
fieldMappings:
- columnName: RegistryKey_s
identifier: Key
- entityType: RegistryValue
fieldMappings:
- columnName: ProcessCommandLine_s
identifier: Name
- columnName: RegistryValue_s
identifier: Value
tactics:
requiredDataConnectors:
- connectorId: TrendMicroXDR
dataTypes:
- TrendMicro_XDR_WORKBENCH_CL
incidentConfiguration:
groupingConfiguration:
enabled: true
reopenClosedIncident: false
lookbackDuration: 5m
matchingMethod: Selected
groupByCustomDetails:
- WorkbenchID
createIncident: true
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Trend Micro Vision One/Analytic Rules/Create Incident for XDR Alerts.yaml
severity: High
name: Create Incident for XDR Alerts
suppressionDuration: 5h
customDetails:
PriorityScore: priorityScore_d
Provider: alertProvider_s
WorkbenchName: workbenchName_s
XDRCustomerID: xdrCustomerID_g
ImpactScopeSummary: impactScope_Summary_s
Severity: severity_s
WorkbenchLink: workbenchLink_s
WorkbenchID: workbenchId_s
CreatedAt: createdTime_t
triggerThreshold: 0
kind: Scheduled
queryPeriod: 5m
query: |
TrendMicro_XDR_WORKBENCH_CL
| extend Severity = case(severity_s == "low", "Informational",
severity_s == "medium", "Low",
severity_s == "high", "Medium",
"High"
)
| extend
UserAccountName_s = todynamic(column_ifexists("UserAccountName_s", "[]")),
UserAccountNTDomain_s = todynamic(column_ifexists("UserAccountNTDomain_s", "[]")),
FileName_s = todynamic(column_ifexists("FileName_s", "[]")),
FileDirectory_s = todynamic(column_ifexists("FileDirectory_s", "[]")),
ProcessCommandLine_s = todynamic(column_ifexists("ProcessCommandLine_s", "[]")),
RegistryKey_s = todynamic(column_ifexists("RegistryKey_s", "[]")),
RegistryValue_s = todynamic(column_ifexists("RegistryValue_s", "[]")),
RegistryValueName_s = todynamic(column_ifexists("RegistryValueName_s", "[]"))
relevantTechniques:
alertDetailsOverride:
alertDescriptionFormat: '{{description_s}}'
alertSeverityColumnName: Severity
alertDisplayNameFormat: '{{workbenchName_s}}'
id: 0febd8cc-1b8d-45ed-87b3-e1e8a57d14cd
queryFrequency: 5m
status: Available
version: 1.0.4
triggerOperator: gt
eventGroupingSettings:
aggregationKind: AlertPerResult
alertRuleTemplateName: