apifirewall_log_1_CL
| where TimeGenerated >= ago(5m)
| where Error_Step_s has "hostpath_mapping"
| project-away Non_blocking_mode_b, Source_Port_d, Destination_Port_d, Query_s, API_ID_g, Response_Header_s, Request_Header_s, Errors_s, Type, UUID_g
| sort by TimeGenerated desc
id: 28500be7-cfcf-40e1-bad4-bc524e9283e2
requiredDataConnectors:
- connectorId: 42CrunchAPIProtection
dataTypes:
- apifirewall_log_1_CL
entityMappings:
- fieldMappings:
- identifier: Address
columnName: Source_IP_s
entityType: IP
- fieldMappings:
- identifier: HostName
columnName: Hostname_s
entityType: Host
- fieldMappings:
- identifier: FullName
columnName: Instance_Name_s
entityType: Account
query: |
apifirewall_log_1_CL
| where TimeGenerated >= ago(5m)
| where Error_Step_s has "hostpath_mapping"
| project-away Non_blocking_mode_b, Source_Port_d, Destination_Port_d, Query_s, API_ID_g, Response_Header_s, Request_Header_s, Errors_s, Type, UUID_g
| sort by TimeGenerated desc
triggerThreshold: 0
kind: Scheduled
severity: Low
queryPeriod: 5m
customDetails:
tactics:
- Reconnaissance
queryFrequency: 5m
status: Available
relevantTechniques:
- T1592
triggerOperator: gt
eventGroupingSettings:
aggregationKind: SingleAlert
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/42Crunch API Protection/Analytic Rules/APIInvalidHostAccess.yaml
description: |
'42Crunch API protection against invalid host access'
name: API - Invalid host access
version: 1.0.1