let threshold = 100;
PulseConnectSecure
| where Messages startswith "Login failed"
| summarize dcount(User) by Computer, bin(TimeGenerated, 15m)
| where dcount_User > threshold
relevantTechniques:
- T1110
entityMappings:
- fieldMappings:
- columnName: Computer
identifier: FullName
entityType: Host
triggerThreshold: 0
description: |
'This query identifies evidence of failed login attempts from a large number of distinct users on a Pulse Connect Secure VPN server'
requiredDataConnectors:
- connectorId: SyslogAma
datatypes:
- Syslog
triggerOperator: gt
version: 1.0.4
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Pulse Connect Secure/Analytic Rules/PulseConnectSecureVPN-DistinctFailedUserLogin.yaml
id: 1fa1528e-f746-4794-8a41-14827f4cb798
queryFrequency: 1h
query: |
let threshold = 100;
PulseConnectSecure
| where Messages startswith "Login failed"
| summarize dcount(User) by Computer, bin(TimeGenerated, 15m)
| where dcount_User > threshold
severity: Medium
status: Available
queryPeriod: 1h
name: PulseConnectSecure - Large Number of Distinct Failed User Logins
tactics:
- CredentialAccess
kind: Scheduled