Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Armorblox Needs Review Alert

Back
Id322d4765-be6b-4868-9e3f-138a4f339dd6
RulenameArmorblox Needs Review Alert
DescriptionThis rule generates an alert for an Armorblox incident where the remediation action is “Needs Review”.
SeverityMedium
Required data connectorsArmorblox
KindScheduled
Query frequency10m
Query period10m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Armorblox/Analytic Rules/ArmorbloxNeedsReviewAlert.yaml
Version1.0.2
Arm template322d4765-be6b-4868-9e3f-138a4f339dd6.json
Deploy To Azure
Armorblox_CL 
| where remediation_actions_s contains "Needs Review"
| extend users_json = parse_json(users_s)
| extend Name = users_json[0].name, Email = users_json[0].email
| project-away users_json
description: |
    'This rule generates an alert for an Armorblox incident where the remediation action is "Needs Review".'
queryPeriod: 10m
severity: Medium
triggerThreshold: 0
queryFrequency: 10m
tactics: []
alertDetailsOverride:
  alertDescriptionFormat: 'Incident {{id_s}} generated at {{date_t}} needs review '
  alertDisplayNameFormat: Alert from Armorblox
  alertSeverityColumnName: priority_s
version: 1.0.2
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Armorblox/Analytic Rules/ArmorbloxNeedsReviewAlert.yaml
query: |
  Armorblox_CL 
  | where remediation_actions_s contains "Needs Review"
  | extend users_json = parse_json(users_s)
  | extend Name = users_json[0].name, Email = users_json[0].email
  | project-away users_json  
entityMappings:
- entityType: Mailbox
  fieldMappings:
  - identifier: MailboxPrimaryAddress
    columnName: Email
  - identifier: DisplayName
    columnName: Name
triggerOperator: GreaterThan
name: Armorblox Needs Review Alert
requiredDataConnectors:
- connectorId: Armorblox
  dataTypes:
  - Armorblox_CL
relevantTechniques: []
customDetails:
  RemediationAction: remediation_actions_s
  IncidentId: id_s
eventGroupingSettings:
  aggregationKind: AlertPerResult
kind: Scheduled
status: Available
id: 322d4765-be6b-4868-9e3f-138a4f339dd6