Threats detected by Eset
| Id | 2d8a60aa-c15e-442e-9ce3-ee924889d2a6 |
| Rulename | Threats detected by Eset |
| Description | Escalates threats detected by Eset. |
| Severity | Low |
| Tactics | Execution CredentialAccess PrivilegeEscalation |
| Techniques | T1204 T1212 T1548 |
| Required data connectors | EsetSMC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Eset Security Management Center/Analytic Rules/eset-threats.yaml |
| Version | 1.0.1 |
| Arm template | 2d8a60aa-c15e-442e-9ce3-ee924889d2a6.json |
eset_CL
| where event_type_s == "Threat_Event"
| extend HostCustomEntity = hostname_s, AccountCustomEntity = username_s, IPCustomEntity = ipv4_s
query: |
eset_CL
| where event_type_s == "Threat_Event"
| extend HostCustomEntity = hostname_s, AccountCustomEntity = username_s, IPCustomEntity = ipv4_s
requiredDataConnectors:
- dataTypes:
- eset_CL
connectorId: EsetSMC
kind: Scheduled
id: 2d8a60aa-c15e-442e-9ce3-ee924889d2a6
triggerOperator: gt
severity: Low
queryPeriod: 5m
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Eset Security Management Center/Analytic Rules/eset-threats.yaml
description: |
'Escalates threats detected by Eset.'
tactics:
- Execution
- CredentialAccess
- PrivilegeEscalation
version: 1.0.1
triggerThreshold: 0
entityMappings:
- entityType: Account
fieldMappings:
- identifier: FullName
columnName: AccountCustomEntity
- entityType: Host
fieldMappings:
- identifier: FullName
columnName: HostCustomEntity
- entityType: IP
fieldMappings:
- identifier: Address
columnName: IPCustomEntity
name: Threats detected by Eset
queryFrequency: 5m
relevantTechniques:
- T1204
- T1212
- T1548