Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Acronis - Multiple Endpoints Accessing Malicious URLs

Back
Id1385f0ce-69d9-4abf-8039-52080c8c7017
RulenameAcronis - Multiple Endpoints Accessing Malicious URLs
DescriptionMultiple endpoints accessing malicious URLs could indicate an ongoing phishing attack, with several employees interacting with those URLs.
SeverityMedium
TacticsExecution
TechniquesT1204.001
KindScheduled
Query frequency1h
Query period1d
Trigger threshold2
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleEndpointsAccessingMaliciousURLs.yaml
Version1.0.0
Arm template1385f0ce-69d9-4abf-8039-52080c8c7017.json
Deploy To Azure
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID == "MaliciousUrlDetected"
| summarize MaliciousUrlDetected = count() by DeviceName
description: Multiple endpoints accessing malicious URLs could indicate an ongoing phishing attack, with several employees interacting with those URLs.
kind: Scheduled
eventGroupingSettings:
  aggregationKind: SingleAlert
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleEndpointsAccessingMaliciousURLs.yaml
triggerOperator: gt
severity: Medium
relevantTechniques:
- T1204.001
triggerThreshold: 2
name: Acronis - Multiple Endpoints Accessing Malicious URLs
customDetails:
  DeviceName: DeviceName
entityMappings:
- fieldMappings:
  - columnName: DeviceName
    identifier: HostName
  entityType: Host
requiredDataConnectors: []
id: 1385f0ce-69d9-4abf-8039-52080c8c7017
queryPeriod: 1d
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    enabled: true
    matchingMethod: AnyAlert
    reopenClosedIncident: true
    lookbackDuration: P1D
tactics:
- Execution
version: 1.0.0
query: |
  CommonSecurityLog
  | where DeviceVendor == "Acronis"
  | where DeviceEventClassID == "MaliciousUrlDetected"
  | summarize MaliciousUrlDetected = count() by DeviceName