Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Github

Back
Id117e8f7c-8f44-4061-bcc2-b444b98a3838
RulenameCyble Vision Alerts Github
DescriptionThis alert generates incidents for Github
SeverityLow
TacticsCollection
CredentialAccess
TechniquesT1213
T1530
T1552
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_github.yaml
Version1.0.1
Arm template117e8f7c-8f44-4061-bcc2-b444b98a3838.json
Deploy To Azure
Alerts_github
| where Service contains "github"
| extend MappedSeverity = Severity
customDetails:
  URL: html_url
  Repository: repo_full_name
  Service: Service
  MappedSeverity: Severity
  OriginalSeverity: Severity
  Score: score
  Owner: owner_login
  AlertID: AlertID
  SHA: sha
  GitURl: git_url
  Status: Status
  FileName: file_name
id: 117e8f7c-8f44-4061-bcc2-b444b98a3838
subTechniques: []
name: Cyble Vision Alerts Github
queryPeriod: 30m
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
    reopenClosedIncident: false
version: 1.0.1
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_github.yaml
query: |
  Alerts_github
  | where Service contains "github"
  | extend MappedSeverity = Severity  
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1213
- T1530
- T1552
suppressionDuration: PT5H
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: owner_login
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: html_url
- entityType: File
  fieldMappings:
  - identifier: Name
    columnName: file_name
  - identifier: Directory
    columnName: file_path
enabled: true
severity: Low
kind: Scheduled
triggerThreshold: 0
triggerOperator: GreaterThan
tactics:
- Collection
- CredentialAccess
status: Available
queryFrequency: 30m
alertDetailsOverride:
  alertDisplayNameFormat: Cyble Vision Alert for Github
  alertDescriptionFormat: This Rule generate incidents for Serviec Github
  alertDynamicProperties: []
description: |
    'This alert generates incidents for Github'