apifirewall_log_1_CL
| where TimeGenerated >= ago(5m)
| where Error_Step_s has "hostpath_mapping"
| project-away Non_blocking_mode_b, Source_Port_d, Destination_Port_d, Query_s, API_ID_g, Response_Header_s, Request_Header_s, Errors_s, Type, UUID_g
| sort by TimeGenerated desc
status: Available
queryPeriod: 5m
triggerOperator: gt
name: API - Invalid host access
entityMappings:
- fieldMappings:
- identifier: Address
columnName: Source_IP_s
entityType: IP
- fieldMappings:
- identifier: HostName
columnName: Hostname_s
entityType: Host
- fieldMappings:
- identifier: FullName
columnName: Instance_Name_s
entityType: Account
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/42Crunch API Protection/Analytic Rules/APIInvalidHostAccess.yaml
description: |
'42Crunch API protection against invalid host access'
version: 1.0.1
severity: Low
tactics:
- Reconnaissance
relevantTechniques:
- T1592
kind: Scheduled
customDetails:
query: |
apifirewall_log_1_CL
| where TimeGenerated >= ago(5m)
| where Error_Step_s has "hostpath_mapping"
| project-away Non_blocking_mode_b, Source_Port_d, Destination_Port_d, Query_s, API_ID_g, Response_Header_s, Request_Header_s, Errors_s, Type, UUID_g
| sort by TimeGenerated desc
id: 28500be7-cfcf-40e1-bad4-bc524e9283e2
eventGroupingSettings:
aggregationKind: SingleAlert
triggerThreshold: 0
requiredDataConnectors:
- dataTypes:
- apifirewall_log_1_CL
connectorId: 42CrunchAPIProtection
queryFrequency: 5m