Threats detected by Eset
| Id | 2d8a60aa-c15e-442e-9ce3-ee924889d2a6 |
| Rulename | Threats detected by Eset |
| Description | Escalates threats detected by Eset. |
| Severity | Low |
| Tactics | Execution CredentialAccess PrivilegeEscalation |
| Techniques | T1204 T1212 T1548 |
| Required data connectors | EsetSMC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Eset Security Management Center/Analytic Rules/eset-threats.yaml |
| Version | 1.0.1 |
| Arm template | 2d8a60aa-c15e-442e-9ce3-ee924889d2a6.json |
eset_CL
| where event_type_s == "Threat_Event"
| extend HostCustomEntity = hostname_s, AccountCustomEntity = username_s, IPCustomEntity = ipv4_s
queryPeriod: 5m
query: |
eset_CL
| where event_type_s == "Threat_Event"
| extend HostCustomEntity = hostname_s, AccountCustomEntity = username_s, IPCustomEntity = ipv4_s
name: Threats detected by Eset
entityMappings:
- fieldMappings:
- columnName: AccountCustomEntity
identifier: FullName
entityType: Account
- fieldMappings:
- columnName: HostCustomEntity
identifier: FullName
entityType: Host
- fieldMappings:
- columnName: IPCustomEntity
identifier: Address
entityType: IP
queryFrequency: 5m
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Eset Security Management Center/Analytic Rules/eset-threats.yaml
requiredDataConnectors:
- connectorId: EsetSMC
dataTypes:
- eset_CL
description: |
'Escalates threats detected by Eset.'
kind: Scheduled
version: 1.0.1
status: Available
severity: Low
relevantTechniques:
- T1204
- T1212
- T1548
triggerOperator: gt
triggerThreshold: 0
tactics:
- Execution
- CredentialAccess
- PrivilegeEscalation
id: 2d8a60aa-c15e-442e-9ce3-ee924889d2a6