Dynatrace Application Security - Attack detection
| Id | 1b0b2065-8bac-5a00-83c4-1b58f69ac212 |
| Rulename | Dynatrace Application Security - Attack detection |
| Description | Dynatrace has detected an ongoing attack in your environment. |
| Severity | High |
| Tactics | Execution Impact InitialAccess PrivilegeEscalation |
| Techniques | T1059 T1565 T1190 T1068 |
| Required data connectors | DynatraceAttacks |
| Kind | Scheduled |
| Query frequency | 1d |
| Query period | 1d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_AttackDetection.yaml |
| Version | 1.0.1 |
| Arm template | 1b0b2065-8bac-5a00-83c4-1b58f69ac212.json |
DynatraceAttacks
| where State != 'ALLOWLISTED'
| summarize arg_max(TimeStamp, *) by AttackId
tactics:
- Execution
- Impact
- InitialAccess
- PrivilegeEscalation
triggerOperator: gt
requiredDataConnectors:
- connectorId: DynatraceAttacks
dataTypes:
- DynatraceAttacks
relevantTechniques:
- T1059
- T1565
- T1190
- T1068
entityMappings:
- fieldMappings:
- identifier: HostName
columnName: host
entityType: Host
- fieldMappings:
- identifier: Url
columnName: url
entityType: URL
- fieldMappings:
- identifier: Address
columnName: sourceIp
entityType: IP
id: 1b0b2065-8bac-5a00-83c4-1b58f69ac212
queryPeriod: 1d
name: Dynatrace Application Security - Attack detection
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_AttackDetection.yaml
queryFrequency: 1d
description: |
'Dynatrace has detected an ongoing attack in your environment.'
customDetails:
AttackType: AttackType
AttackState: State
DisplayIdentifier: DisplayId
AttackIdentifier: AttackId
version: 1.0.1
query: |
DynatraceAttacks
| where State != 'ALLOWLISTED'
| summarize arg_max(TimeStamp, *) by AttackId
incidentConfiguration:
groupingConfiguration:
matchingMethod: AllEntities
lookbackDuration: P7D
enabled: true
reopenClosedIncident: true
createIncident: true
alertDetailsOverride:
alertDescriptionFormat: |
Dynatrace has detected an ongoing attack in your environment which was {{State}}.
alertDisplayNameFormat: 'Dynatrace Attack {{State}} - {{DisplayId}} : {{DisplayName}}'
triggerThreshold: 0
severity: High
status: Available
eventGroupingSettings:
aggregationKind: AlertPerResult
kind: Scheduled