Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Dynatrace Application Security - Code-Level runtime vulnerability detection

Back
Id305093b4-0fa2-57bc-bced-caea782a6e9c
RulenameDynatrace Application Security - Code-Level runtime vulnerability detection
DescriptionDetect Code-level runtime vulnerabilities in your environment
SeverityMedium
TacticsDefenseEvasion
Execution
Impact
InitialAccess
LateralMovement
Persistence
PrivilegeEscalation
Required data connectorsDynatraceRuntimeVulnerabilities
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
Version1.0.3
Arm template305093b4-0fa2-57bc-bced-caea782a6e9c.json
Deploy To Azure
DynatraceSecurityProblems
| where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
| summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
query: |
  DynatraceSecurityProblems
  | where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
  | summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId  
triggerOperator: gt
requiredTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
queryPeriod: 1d
triggerThreshold: 0
kind: Scheduled
alertDetailsOverride:
  alertDisplayNameFormat: 'Dynatrace Code-Level runtime vulnerability detected - {{DisplayId}} : {{Title}}'
  alertDescriptionFormat: |
        Code-Level runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
  alertSeverityColumnName: Severity
name: Dynatrace Application Security - Code-Level runtime vulnerability detection
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
eventGroupingSettings:
  aggregationKind: AlertPerResult
id: 305093b4-0fa2-57bc-bced-caea782a6e9c
queryFrequency: 1d
description: Detect Code-level runtime vulnerabilities in your environment
status: Available
requiredDataConnectors:
- dataTypes:
  - DynatraceSecurityProblems
  connectorId: DynatraceRuntimeVulnerabilities
incidentConfiguration:
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    reopenClosedIncident: false
    lookbackDuration: PT5H
  createIncident: false
entityMappings:
- fieldMappings:
  - columnName: Url
    identifier: Url
  entityType: URL
severity: Medium
customDetails:
  DisplayIdentifier: DisplayId
  Technology: Technology
  ExternVulnIdentifier: ExternalVulnerabilityId
  DAVISRiskLevel: DAVISRiskLevel
  DAVISRiskVector: DAVISRiskVector
  CVEIds: CVEIds
  DAVISRiskScore: DAVISRiskScore
  DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
  PackageName: PackageName
  SecurityProblemUrl: Url
  DAVISExposure: DAVISExposure
  SecProbIdentifier: SecurityProblemId
  DAVISDataAssets: DAVISDataAssets
  DAVISPublicExploit: DAVISPublicExploit
  VulnerabilityType: VulnerabilityType
version: 1.0.3