Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Dynatrace Application Security - Code-Level runtime vulnerability detection

Back
Id305093b4-0fa2-57bc-bced-caea782a6e9c
RulenameDynatrace Application Security - Code-Level runtime vulnerability detection
DescriptionDetect Code-level runtime vulnerabilities in your environment
SeverityMedium
TacticsDefenseEvasion
Execution
Impact
InitialAccess
LateralMovement
Persistence
PrivilegeEscalation
TechniquesT1140
T1059
T1565
T1659
T1210
T1554
T1548
Required data connectorsDynatraceRuntimeVulnerabilities
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
Version1.0.4
Arm template305093b4-0fa2-57bc-bced-caea782a6e9c.json
Deploy To Azure
DynatraceSecurityProblems
| where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
| summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
name: Dynatrace Application Security - Code-Level runtime vulnerability detection
requiredDataConnectors:
- dataTypes:
  - DynatraceSecurityProblems
  connectorId: DynatraceRuntimeVulnerabilities
queryPeriod: 1d
query: |
  DynatraceSecurityProblems
  | where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
  | summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId  
status: Available
entityMappings:
- entityType: URL
  fieldMappings:
  - columnName: Url
    identifier: Url
relevantTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
version: 1.0.4
customDetails:
  DAVISDataAssets: DAVISDataAssets
  DAVISExposure: DAVISExposure
  ExternVulnIdentifier: ExternalVulnerabilityId
  DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
  DAVISRiskLevel: DAVISRiskLevel
  CVEIds: CVEIds
  DAVISRiskVector: DAVISRiskVector
  SecurityProblemUrl: Url
  DAVISPublicExploit: DAVISPublicExploit
  PackageName: PackageName
  DAVISRiskScore: DAVISRiskScore
  DisplayIdentifier: DisplayId
  Technology: Technology
  VulnerabilityType: VulnerabilityType
  SecProbIdentifier: SecurityProblemId
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
triggerOperator: gt
alertDetailsOverride:
  alertSeverityColumnName: Severity
  alertDisplayNameFormat: 'Dynatrace Code-Level runtime vulnerability detected - {{DisplayId}} : {{Title}}'
  alertDescriptionFormat: |
        Code-Level runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
eventGroupingSettings:
  aggregationKind: AlertPerResult
id: 305093b4-0fa2-57bc-bced-caea782a6e9c
queryFrequency: 1d
incidentConfiguration:
  createIncident: false
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    reopenClosedIncident: false
    lookbackDuration: PT5H
kind: Scheduled
severity: Medium
triggerThreshold: 0
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
description: Detect Code-level runtime vulnerabilities in your environment