Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Compromised Endpoint Cookies

Back
Id33B07EAA-F451-4C38-AC9F-8AF3F7E99F0E
RulenameCyble Vision Alerts Compromised Endpoint Cookies
DescriptionDetects compromised browser cookies associated with monitored entities. Identifies exposed authentication cookies with future expiry, enabling potential session hijacking or persistent unauthorized access.
SeverityLow
TacticsCredentialAccess
DefenseEvasion
TechniquesT1539
T1550
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Compromised_Endpoints_Cookies.yaml
Version1.0.0
Arm template33B07EAA-F451-4C38-AC9F-8AF3F7E99F0E.json
Deploy To Azure
Alerts_compromised_endpoints_cookies
| where Service == "compromised_endpoints_cookies"
| extend MappedSeverity = Severity
name: Cyble Vision Alerts Compromised Endpoint Cookies
alertDetailsOverride:
  alertDisplayNameFormat: Compromised Session Cookie {{CEC_Email}} {{CEC_URL}}
  alertDescriptionFormat: |
        A compromised browser session cookie associated with {{CEC_EmailDomain}} was detected for service {{CEC_URL}}. The cookie has not expired and may allow session hijacking. Session ID {{CEC_SessionID}}.
query: |
  Alerts_compromised_endpoints_cookies
  | where Service == "compromised_endpoints_cookies"
  | extend MappedSeverity = Severity  
id: 33B07EAA-F451-4C38-AC9F-8AF3F7E99F0E
enabled: true
entityMappings:
- fieldMappings:
  - columnName: CEC_URL
    identifier: Url
  entityType: Url
- fieldMappings:
  - columnName: CEC_Email
    identifier: FullName
  entityType: Account
version: 1.0.0
triggerOperator: GreaterThan
suppressionDuration: PT1H
description: |
    'Detects compromised browser cookies associated with monitored entities. Identifies exposed authentication cookies with future expiry, enabling potential session hijacking or persistent unauthorized access.'
kind: Scheduled
queryfrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Compromised_Endpoints_Cookies.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  AlertID: AlertID
  CookieDomain: CEC_EmailDomain
  CookieEmail: CEC_Email
  CookieURL: CEC_URL
  CookieSessionID: CEC_SessionID
  Service: Service
  CookieExpiry: CEC_Expiry
  Status: Status
  MappedSeverity: Severity
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1539
- T1550
tactics:
- CredentialAccess
- DefenseEvasion