Threats detected by Eset
| Id | 2d8a60aa-c15e-442e-9ce3-ee924889d2a6 |
| Rulename | Threats detected by Eset |
| Description | Escalates threats detected by Eset. |
| Severity | Low |
| Tactics | Execution CredentialAccess PrivilegeEscalation |
| Techniques | T1204 T1212 T1548 |
| Required data connectors | EsetSMC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Eset Security Management Center/Analytic Rules/eset-threats.yaml |
| Version | 1.0.1 |
| Arm template | 2d8a60aa-c15e-442e-9ce3-ee924889d2a6.json |
eset_CL
| where event_type_s == "Threat_Event"
| extend HostCustomEntity = hostname_s, AccountCustomEntity = username_s, IPCustomEntity = ipv4_s
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Eset Security Management Center/Analytic Rules/eset-threats.yaml
query: |
eset_CL
| where event_type_s == "Threat_Event"
| extend HostCustomEntity = hostname_s, AccountCustomEntity = username_s, IPCustomEntity = ipv4_s
requiredDataConnectors:
- dataTypes:
- eset_CL
connectorId: EsetSMC
tactics:
- Execution
- CredentialAccess
- PrivilegeEscalation
name: Threats detected by Eset
relevantTechniques:
- T1204
- T1212
- T1548
severity: Low
entityMappings:
- fieldMappings:
- identifier: FullName
columnName: AccountCustomEntity
entityType: Account
- fieldMappings:
- identifier: FullName
columnName: HostCustomEntity
entityType: Host
- fieldMappings:
- identifier: Address
columnName: IPCustomEntity
entityType: IP
kind: Scheduled
queryFrequency: 5m
description: |
'Escalates threats detected by Eset.'
triggerThreshold: 0
triggerOperator: gt
version: 1.0.1
queryPeriod: 5m
id: 2d8a60aa-c15e-442e-9ce3-ee924889d2a6