Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Mimecast Secure Email Gateway - Impersonation Protect

Back
Id2ef77cef-439f-4d94-848f-3eca67510d2f
RulenameMimecast Secure Email Gateway - Impersonation Protect
DescriptionDetects threats from impersonation mail under targeted threat protection.
SeverityHigh
TacticsDiscovery
LateralMovement
Collection
TechniquesT1114
Required data connectorsMimecastSEGAPI
KindScheduled
Query frequency15m
Query period15m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastSEG/MimecastCG_Impersonation.yaml
Version1.0.0
Arm template2ef77cef-439f-4d94-848f-3eca67510d2f.json
Deploy To Azure
MimecastCG
| where Type == "email_ttp_impersonation"
| extend  SenderEnvelope = ['Sender Envelope'] , SenderIp = ['Sender IP']
eventGroupingSettings:
  aggregationKind: AlertPerResult
triggerThreshold: 0
entityMappings:
- entityType: MailMessage
  fieldMappings:
  - identifier: Sender
    columnName: SenderEnvelope
  - identifier: SenderIP
    columnName: SenderIp
  - identifier: Recipient
    columnName: Recipients
requiredDataConnectors:
- dataTypes:
  - MimecastCG
  connectorId: MimecastSEGAPI
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastSEG/MimecastCG_Impersonation.yaml
enabled: true
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    enabled: true
    reopenClosedIncident: false
    matchingMethod: AllEntities
    lookbackDuration: P7D
version: 1.0.0
name: Mimecast Secure Email Gateway - Impersonation Protect
relevantTechniques:
- T1114
status: Available
suppressionEnabled: false
queryPeriod: 15m
kind: Scheduled
id: 2ef77cef-439f-4d94-848f-3eca67510d2f
query: |
  MimecastCG
  | where Type == "email_ttp_impersonation"
  | extend  SenderEnvelope = ['Sender Envelope'] , SenderIp = ['Sender IP']  
description: |
    'Detects threats from impersonation mail under targeted threat protection.'
queryFrequency: 15m
severity: High
triggerOperator: gt
tactics:
- Discovery
- LateralMovement
- Collection
suppressionDuration: 5h