Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Ping Federate - Forbidden country

Back
Id14042f74-e50b-4c21-8a01-0faf4915ada4
RulenamePing Federate - Forbidden country
DescriptionDetects requests from forbidden countries.
SeverityHigh
TacticsInitialAccess
TechniquesT1078
Required data connectorsCefAma
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/PingFederate/Analytic Rules/PingFederateForbiddenCountry.yaml
Version1.0.3
Arm template14042f74-e50b-4c21-8a01-0faf4915ada4.json
Deploy To Azure
let forbidden_geo = dynamic(['CH']);
PingFederateEvent
| where isnotempty(DstGeoCountry)
| where tostring(DstGeoCountry) in~ (forbidden_geo)
| extend AccountCustomEntity = DstUserName
| extend IpCustomEntity = SrcIpAddr
name: Ping Federate - Forbidden country
id: 14042f74-e50b-4c21-8a01-0faf4915ada4
description: |
    'Detects requests from forbidden countries.'
triggerThreshold: 0
entityMappings:
- fieldMappings:
  - columnName: AccountCustomEntity
    identifier: Name
  entityType: Account
- fieldMappings:
  - columnName: IpCustomEntity
    identifier: Address
  entityType: IP
version: 1.0.3
triggerOperator: gt
query: |
  let forbidden_geo = dynamic(['CH']);
  PingFederateEvent
  | where isnotempty(DstGeoCountry)
  | where tostring(DstGeoCountry) in~ (forbidden_geo)
  | extend AccountCustomEntity = DstUserName
  | extend IpCustomEntity = SrcIpAddr  
tactics:
- InitialAccess
kind: Scheduled
queryFrequency: 1h
severity: High
queryPeriod: 1h
requiredDataConnectors:
- dataTypes:
  - CommonSecurityLog
  connectorId: CefAma
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/PingFederate/Analytic Rules/PingFederateForbiddenCountry.yaml
relevantTechniques:
- T1078