Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Acronis - Multiple Endpoints Accessing Malicious URLs

Back
Id1385f0ce-69d9-4abf-8039-52080c8c7017
RulenameAcronis - Multiple Endpoints Accessing Malicious URLs
DescriptionMultiple endpoints accessing malicious URLs could indicate an ongoing phishing attack, with several employees interacting with those URLs.
SeverityMedium
TacticsExecution
TechniquesT1204.001
KindScheduled
Query frequency1h
Query period1d
Trigger threshold2
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleEndpointsAccessingMaliciousURLs.yaml
Version1.0.0
Arm template1385f0ce-69d9-4abf-8039-52080c8c7017.json
Deploy To Azure
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID == "MaliciousUrlDetected"
| summarize MaliciousUrlDetected = count() by DeviceName
queryPeriod: 1d
requiredDataConnectors: []
severity: Medium
triggerOperator: gt
customDetails:
  DeviceName: DeviceName
entityMappings:
- fieldMappings:
  - identifier: HostName
    columnName: DeviceName
  entityType: Host
version: 1.0.0
triggerThreshold: 2
tactics:
- Execution
relevantTechniques:
- T1204.001
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleEndpointsAccessingMaliciousURLs.yaml
eventGroupingSettings:
  aggregationKind: SingleAlert
query: |
  CommonSecurityLog
  | where DeviceVendor == "Acronis"
  | where DeviceEventClassID == "MaliciousUrlDetected"
  | summarize MaliciousUrlDetected = count() by DeviceName  
id: 1385f0ce-69d9-4abf-8039-52080c8c7017
name: Acronis - Multiple Endpoints Accessing Malicious URLs
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: P1D
    reopenClosedIncident: true
    matchingMethod: AnyAlert
    enabled: true
description: Multiple endpoints accessing malicious URLs could indicate an ongoing phishing attack, with several employees interacting with those URLs.
kind: Scheduled
queryFrequency: 1h