Dynatrace Application Security - Attack detection
| Id | 1b0b2065-8bac-5a00-83c4-1b58f69ac212 |
| Rulename | Dynatrace Application Security - Attack detection |
| Description | Dynatrace has detected an ongoing attack in your environment. |
| Severity | High |
| Tactics | Execution Impact InitialAccess PrivilegeEscalation |
| Techniques | T1059 T1565 T1190 T1068 |
| Required data connectors | DynatraceAttacks |
| Kind | Scheduled |
| Query frequency | 1d |
| Query period | 1d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_AttackDetection.yaml |
| Version | 1.0.1 |
| Arm template | 1b0b2065-8bac-5a00-83c4-1b58f69ac212.json |
DynatraceAttacks
| where State != 'ALLOWLISTED'
| summarize arg_max(TimeStamp, *) by AttackId
name: Dynatrace Application Security - Attack detection
relevantTechniques:
- T1059
- T1565
- T1190
- T1068
id: 1b0b2065-8bac-5a00-83c4-1b58f69ac212
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_AttackDetection.yaml
requiredDataConnectors:
- dataTypes:
- DynatraceAttacks
connectorId: DynatraceAttacks
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.0.1
severity: High
triggerThreshold: 0
queryPeriod: 1d
entityMappings:
- fieldMappings:
- identifier: HostName
columnName: host
entityType: Host
- fieldMappings:
- identifier: Url
columnName: url
entityType: URL
- fieldMappings:
- identifier: Address
columnName: sourceIp
entityType: IP
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: true
matchingMethod: AllEntities
lookbackDuration: P7D
enabled: true
createIncident: true
kind: Scheduled
alertDetailsOverride:
alertDisplayNameFormat: 'Dynatrace Attack {{State}} - {{DisplayId}} : {{DisplayName}}'
alertDescriptionFormat: |
Dynatrace has detected an ongoing attack in your environment which was {{State}}.
queryFrequency: 1d
status: Available
query: |
DynatraceAttacks
| where State != 'ALLOWLISTED'
| summarize arg_max(TimeStamp, *) by AttackId
tactics:
- Execution
- Impact
- InitialAccess
- PrivilegeEscalation
customDetails:
AttackIdentifier: AttackId
AttackType: AttackType
DisplayIdentifier: DisplayId
AttackState: State
description: |
'Dynatrace has detected an ongoing attack in your environment.'
triggerOperator: gt