Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Github

Back
Id117e8f7c-8f44-4061-bcc2-b444b98a3838
RulenameCyble Vision Alerts Github
DescriptionThis alert generates incidents for Github
SeverityLow
TacticsCollection
CredentialAccess
TechniquesT1213
T1530
T1552
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_github.yaml
Version1.0.0
Arm template117e8f7c-8f44-4061-bcc2-b444b98a3838.json
Deploy To Azure
Alerts_github
| where Service contains "github"
| extend MappedSeverity = Severity
subTechniques: []
description: |
    'This alert generates incidents for Github'
version: 1.0.0
queryPeriod: 30m
customDetails:
  FileName: file_name
  Status: Status
  Score: score
  AlertID: AlertID
  HTMLURL: html_url
  Repository: repo_full_name
  OriginalSeverity: Severity
  SHA: sha
  Owner: owner_login
  GitURl: git_url
  Service: Service
  MappedSeverity: Severity
status: Available
id: 117e8f7c-8f44-4061-bcc2-b444b98a3838
enabled: true
tactics:
- Collection
- CredentialAccess
entityMappings:
- entityType: Account
  fieldMappings:
  - columnName: owner_login
    identifier: Name
- entityType: URL
  fieldMappings:
  - columnName: html_url
    identifier: Url
- entityType: File
  fieldMappings:
  - columnName: file_name
    identifier: Name
  - columnName: file_path
    identifier: Directory
alertDetailsOverride:
  alertDynamicProperties: []
  alertDescriptionFormat: This Rule generate incidents for Serviec Github
  alertDisplayNameFormat: Cyble Vision ALert for Github
name: Cyble Vision Alerts Github
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
    lookbackDuration: PT5H
  createIncident: true
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryFrequency: 30m
suppressionDuration: PT5H
triggerThreshold: 0
triggerOperator: GreaterThan
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_github.yaml
kind: Scheduled
relevantTechniques:
- T1213
- T1530
- T1552
query: |
  Alerts_github
  | where Service contains "github"
  | extend MappedSeverity = Severity  
severity: Low
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL