CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID == "MaliciousUrlDetected"
| summarize MaliciousUrlDetected = count() by DeviceName
description: Multiple endpoints accessing malicious URLs could indicate an ongoing phishing attack, with several employees interacting with those URLs.
entityMappings:
- fieldMappings:
- columnName: DeviceName
identifier: HostName
entityType: Host
query: |
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID == "MaliciousUrlDetected"
| summarize MaliciousUrlDetected = count() by DeviceName
tactics:
- Execution
severity: Medium
triggerThreshold: 2
queryFrequency: 1h
queryPeriod: 1d
relevantTechniques:
- T1204.001
version: 1.0.0
id: 1385f0ce-69d9-4abf-8039-52080c8c7017
name: Acronis - Multiple Endpoints Accessing Malicious URLs
incidentConfiguration:
createIncident: true
groupingConfiguration:
reopenClosedIncident: true
enabled: true
matchingMethod: AnyAlert
lookbackDuration: P1D
kind: Scheduled
triggerOperator: gt
customDetails:
DeviceName: DeviceName
eventGroupingSettings:
aggregationKind: SingleAlert
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleEndpointsAccessingMaliciousURLs.yaml
requiredDataConnectors: []