Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Advisory Alerts Advisory

Back
Id1932DCFD-A32E-49F9-A212-5BCD084FBD78
RulenameCyble Advisory Alerts Advisory
DescriptionGenerates Microsoft Sentinel incidents from Cyble Advisory service alerts. Advisory alerts provide intelligence and context related to monitored keywords.Severity is normalized using MappedSeverity for downstream automation.
SeverityLow
TacticsReconnaissance
ResourceDevelopment
TechniquesT1595
T1596
T1587
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_advisory.yaml
Version1.0.0
Arm template1932DCFD-A32E-49F9-A212-5BCD084FBD78.json
Deploy To Azure
Alerts_advisory
| where Service == "advisory" 
| extend MappedSeverity = Severity
customDetails:
  Keyword: KeywordName
  BucketName: BucketName
  AdvisoryId: ADV_Value
  MappedSeverity: Severity
  AlertID: AlertID
  Service: Service
  Status: Status
id: 1932DCFD-A32E-49F9-A212-5BCD084FBD78
name: Cyble Advisory Alerts Advisory
queryPeriod: 30m
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
incidentConfiguration:
  createIncident: true
  alertDetailsOverride: 
  alertDescriptionFormat: |
        Vision Alert for AdvisoryId {{ADV_Value}}
  alertDisplayNameFormat: Cyble Vision Advisory {{ADV_Value}} detected
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
    reopenClosedIncident: false
suppressionEnabled: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_advisory.yaml
query: |
  Alerts_advisory
  | where Service == "advisory" 
  | extend MappedSeverity = Severity  
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1595
- T1596
- T1587
entityMappings: 
enabled: true
severity: Low
version: 1.0.0
triggerThreshold: 0
triggerOperator: GreaterThan
tactics:
- Reconnaissance
- ResourceDevelopment
status: Available
queryfrequency: 30m
kind: Scheduled
description: |
    'Generates Microsoft Sentinel incidents from Cyble Advisory service alerts. Advisory alerts provide intelligence and context related to monitored keywords.Severity is normalized using MappedSeverity for downstream automation.'