Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Samsung Knox - Application Privilege Escalation or Change Events

Back
Id215e89ca-cdbc-4661-b8b2-7041f6ecc7fb
RulenameSamsung Knox - Application Privilege Escalation or Change Events
DescriptionWhen a Knox mobile app has transitioned from an acceptable uid/esuid/fsuid to a different, non-App id.
SeverityHigh
TacticsPrivilegeEscalation
TechniquesT1548
Required data connectorsSamsungDCDefinition
KindNRT
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Samsung Knox Asset Intelligence/Analytic Rules/SamsungKnoxApplicationPrivilegeEscalationOrChange.yaml
Version1.0.2
Arm template215e89ca-cdbc-4661-b8b2-7041f6ecc7fb.json
Deploy To Azure
Samsung_Knox_Process_CL 
| where Name == "PROCESS_PRIVILEGE_ESCALATION"
| where MitreTtp has "T1548"
suppressionEnabled: false
description: When a Knox mobile app has transitioned from an acceptable uid/esuid/fsuid to a different, non-App id.
kind: NRT
tactics:
- PrivilegeEscalation
requiredDataConnectors:
- connectorId: SamsungDCDefinition
  dataTypes:
  - Samsung_Knox_Process_CL
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Samsung Knox Asset Intelligence/Analytic Rules/SamsungKnoxApplicationPrivilegeEscalationOrChange.yaml
severity: High
name: Samsung Knox - Application Privilege Escalation or Change Events
suppressionDuration: PT5H
eventGroupingSettings:
  aggregationKind: SingleAlert
query: |
  Samsung_Knox_Process_CL 
  | where Name == "PROCESS_PRIVILEGE_ESCALATION"
  | where MitreTtp has "T1548"  
relevantTechniques:
- T1548
id: 215e89ca-cdbc-4661-b8b2-7041f6ecc7fb
status: Available
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    lookbackDuration: PT5H
    enabled: false
    matchingMethod: AllEntities
  createIncident: true
version: 1.0.2