Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Dynatrace Application Security - Code-Level runtime vulnerability detection

Back
Id305093b4-0fa2-57bc-bced-caea782a6e9c
RulenameDynatrace Application Security - Code-Level runtime vulnerability detection
DescriptionDetect Code-level runtime vulnerabilities in your environment
SeverityMedium
TacticsDefenseEvasion
Execution
Impact
InitialAccess
LateralMovement
Persistence
PrivilegeEscalation
Required data connectorsDynatraceRuntimeVulnerabilities
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
Version1.0.3
Arm template305093b4-0fa2-57bc-bced-caea782a6e9c.json
Deploy To Azure
DynatraceSecurityProblems
| where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
| summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
queryPeriod: 1d
requiredDataConnectors:
- connectorId: DynatraceRuntimeVulnerabilities
  dataTypes:
  - DynatraceSecurityProblems
severity: Medium
triggerOperator: gt
customDetails:
  VulnerabilityType: VulnerabilityType
  CVEIds: CVEIds
  DAVISRiskVector: DAVISRiskVector
  DisplayIdentifier: DisplayId
  SecProbIdentifier: SecurityProblemId
  PackageName: PackageName
  DAVISRiskScore: DAVISRiskScore
  DAVISRiskLevel: DAVISRiskLevel
  ExternVulnIdentifier: ExternalVulnerabilityId
  DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
  Technology: Technology
  DAVISPublicExploit: DAVISPublicExploit
  SecurityProblemUrl: Url
  DAVISExposure: DAVISExposure
  DAVISDataAssets: DAVISDataAssets
entityMappings:
- fieldMappings:
  - identifier: Url
    columnName: Url
  entityType: URL
version: 1.0.3
triggerThreshold: 0
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
name: Dynatrace Application Security - Code-Level runtime vulnerability detection
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
eventGroupingSettings:
  aggregationKind: AlertPerResult
query: |
  DynatraceSecurityProblems
  | where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
  | summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId  
id: 305093b4-0fa2-57bc-bced-caea782a6e9c
status: Available
incidentConfiguration:
  createIncident: false
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
description: Detect Code-level runtime vulnerabilities in your environment
alertDetailsOverride:
  alertSeverityColumnName: Severity
  alertDescriptionFormat: |
        Code-Level runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
  alertDisplayNameFormat: 'Dynatrace Code-Level runtime vulnerability detected - {{DisplayId}} : {{Title}}'
kind: Scheduled
requiredTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
queryFrequency: 1d