Dynatrace Application Security - Attack detection
| Id | 1b0b2065-8bac-5a00-83c4-1b58f69ac212 |
| Rulename | Dynatrace Application Security - Attack detection |
| Description | Dynatrace has detected an ongoing attack in your environment. |
| Severity | High |
| Tactics | Execution Impact InitialAccess PrivilegeEscalation |
| Techniques | T1059 T1565 T1190 T1068 |
| Required data connectors | DynatraceAttacks |
| Kind | Scheduled |
| Query frequency | 1d |
| Query period | 1d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_AttackDetection.yaml |
| Version | 1.0.1 |
| Arm template | 1b0b2065-8bac-5a00-83c4-1b58f69ac212.json |
DynatraceAttacks
| where State != 'ALLOWLISTED'
| summarize arg_max(TimeStamp, *) by AttackId
name: Dynatrace Application Security - Attack detection
kind: Scheduled
tactics:
- Execution
- Impact
- InitialAccess
- PrivilegeEscalation
triggerThreshold: 0
triggerOperator: gt
version: 1.0.1
status: Available
alertDetailsOverride:
alertDisplayNameFormat: 'Dynatrace Attack {{State}} - {{DisplayId}} : {{DisplayName}}'
alertDescriptionFormat: |
Dynatrace has detected an ongoing attack in your environment which was {{State}}.
incidentConfiguration:
createIncident: true
groupingConfiguration:
matchingMethod: AllEntities
enabled: true
lookbackDuration: P7D
reopenClosedIncident: true
queryFrequency: 1d
id: 1b0b2065-8bac-5a00-83c4-1b58f69ac212
requiredDataConnectors:
- connectorId: DynatraceAttacks
dataTypes:
- DynatraceAttacks
relevantTechniques:
- T1059
- T1565
- T1190
- T1068
description: |
'Dynatrace has detected an ongoing attack in your environment.'
customDetails:
AttackIdentifier: AttackId
AttackType: AttackType
DisplayIdentifier: DisplayId
AttackState: State
entityMappings:
- entityType: Host
fieldMappings:
- columnName: host
identifier: HostName
- entityType: URL
fieldMappings:
- columnName: url
identifier: Url
- entityType: IP
fieldMappings:
- columnName: sourceIp
identifier: Address
query: |
DynatraceAttacks
| where State != 'ALLOWLISTED'
| summarize arg_max(TimeStamp, *) by AttackId
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_AttackDetection.yaml
queryPeriod: 1d
severity: High
eventGroupingSettings:
aggregationKind: AlertPerResult