Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Dynatrace Application Security - Code-Level runtime vulnerability detection

Back
Id305093b4-0fa2-57bc-bced-caea782a6e9c
RulenameDynatrace Application Security - Code-Level runtime vulnerability detection
DescriptionDetect Code-level runtime vulnerabilities in your environment
SeverityMedium
TacticsDefenseEvasion
Execution
Impact
InitialAccess
LateralMovement
Persistence
PrivilegeEscalation
Required data connectorsDynatraceRuntimeVulnerabilities
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
Version1.0.3
Arm template305093b4-0fa2-57bc-bced-caea782a6e9c.json
Deploy To Azure
DynatraceSecurityProblems
| where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
| summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
status: Available
eventGroupingSettings:
  aggregationKind: AlertPerResult
kind: Scheduled
customDetails:
  DAVISRiskScore: DAVISRiskScore
  CVEIds: CVEIds
  SecProbIdentifier: SecurityProblemId
  DisplayIdentifier: DisplayId
  Technology: Technology
  DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
  PackageName: PackageName
  DAVISExposure: DAVISExposure
  DAVISDataAssets: DAVISDataAssets
  VulnerabilityType: VulnerabilityType
  DAVISRiskVector: DAVISRiskVector
  SecurityProblemUrl: Url
  DAVISPublicExploit: DAVISPublicExploit
  ExternVulnIdentifier: ExternalVulnerabilityId
  DAVISRiskLevel: DAVISRiskLevel
name: Dynatrace Application Security - Code-Level runtime vulnerability detection
queryFrequency: 1d
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
requiredTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
severity: Medium
id: 305093b4-0fa2-57bc-bced-caea782a6e9c
incidentConfiguration:
  createIncident: false
  groupingConfiguration:
    matchingMethod: AllEntities
    reopenClosedIncident: false
    enabled: false
    lookbackDuration: PT5H
entityMappings:
- entityType: URL
  fieldMappings:
  - columnName: Url
    identifier: Url
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
queryPeriod: 1d
version: 1.0.3
requiredDataConnectors:
- connectorId: DynatraceRuntimeVulnerabilities
  dataTypes:
  - DynatraceSecurityProblems
triggerThreshold: 0
triggerOperator: gt
alertDetailsOverride:
  alertSeverityColumnName: Severity
  alertDisplayNameFormat: 'Dynatrace Code-Level runtime vulnerability detected - {{DisplayId}} : {{Title}}'
  alertDescriptionFormat: |
        Code-Level runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
query: |
  DynatraceSecurityProblems
  | where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
  | summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId  
description: Detect Code-level runtime vulnerabilities in your environment