Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

SPF Policy Set to Soft Fail

Back
Id32f4eb88-0d23-4185-8579-f1645412e9de
RulenameSPF Policy Set to Soft Fail
DescriptionSPF Policy Set to Soft Fail
SeverityLow
TacticsInitialAccess
Discovery
TechniquesT1566
T1087
Required data connectorsHVPollingIDAzureFunctions
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/SPFPolicySetToSoftFail.yaml
Version1.0.4
Arm template32f4eb88-0d23-4185-8579-f1645412e9de.json
Deploy To Azure
HackerViewLog_Azure_1_CL | where severity_s == "low" | where progress_status_s == "New" | where status_s != "inactive"  | where issue_name_s == "SPF Policy Set to Soft Fail"
triggerOperator: gt
incidentConfiguration:
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: false
    reopenClosedIncident: false
    lookbackDuration: PT5H
  createIncident: true
queryFrequency: 5m
requiredDataConnectors:
- connectorId: HVPollingIDAzureFunctions
  dataTypes:
  - HackerViewLog_Azure_1_CL
relevantTechniques:
- T1566
- T1087
entityMappings:
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: meta_resolved_ip_s
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: meta_host_s
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: hackerview_link_s
query: HackerViewLog_Azure_1_CL | where severity_s == "low" | where progress_status_s == "New" | where status_s != "inactive"  | where issue_name_s == "SPF Policy Set to Soft Fail"
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/SPFPolicySetToSoftFail.yaml
suppressionEnabled: false
queryPeriod: 5m
name: SPF Policy Set to Soft Fail
status: Available
kind: Scheduled
description: |
    'SPF Policy Set to Soft Fail'
id: 32f4eb88-0d23-4185-8579-f1645412e9de
version: 1.0.4
eventGroupingSettings:
  aggregationKind: SingleAlert
tactics:
- InitialAccess
- Discovery
severity: Low
suppressionDuration: 5h