Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Compromised Endpoint Cookies

Back
Id33B07EAA-F451-4C38-AC9F-8AF3F7E99F0E
RulenameCyble Vision Alerts Compromised Endpoint Cookies
DescriptionDetects compromised browser cookies associated with monitored entities. Identifies exposed authentication cookies with future expiry, enabling potential session hijacking or persistent unauthorized access.
SeverityLow
TacticsCredentialAccess
DefenseEvasion
TechniquesT1539
T1550
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Compromised_Endpoints_Cookies.yaml
Version1.0.0
Arm template33B07EAA-F451-4C38-AC9F-8AF3F7E99F0E.json
Deploy To Azure
Alerts_compromised_endpoints_cookies
| where Service == "compromised_endpoints_cookies"
| extend MappedSeverity = Severity
relevantTechniques:
- T1539
- T1550
entityMappings:
- entityType: Url
  fieldMappings:
  - columnName: CEC_URL
    identifier: Url
- entityType: Account
  fieldMappings:
  - columnName: CEC_Email
    identifier: FullName
eventGroupingSettings:
  aggregationKind: AlertPerResult
version: 1.0.0
query: |
  Alerts_compromised_endpoints_cookies
  | where Service == "compromised_endpoints_cookies"
  | extend MappedSeverity = Severity  
id: 33B07EAA-F451-4C38-AC9F-8AF3F7E99F0E
suppressionDuration: PT1H
severity: Low
kind: Scheduled
queryfrequency: 30m
description: |
    'Detects compromised browser cookies associated with monitored entities. Identifies exposed authentication cookies with future expiry, enabling potential session hijacking or persistent unauthorized access.'
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
triggerOperator: GreaterThan
name: Cyble Vision Alerts Compromised Endpoint Cookies
tactics:
- CredentialAccess
- DefenseEvasion
alertDetailsOverride:
  alertDescriptionFormat: |
        A compromised browser session cookie associated with {{CEC_EmailDomain}} was detected for service {{CEC_URL}}. The cookie has not expired and may allow session hijacking. Session ID {{CEC_SessionID}}.
  alertDisplayNameFormat: Compromised Session Cookie {{CEC_Email}} {{CEC_URL}}
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Compromised_Endpoints_Cookies.yaml
triggerThreshold: 0
queryPeriod: 30m
enabled: true
status: Available
customDetails:
  CookieDomain: CEC_EmailDomain
  CookieExpiry: CEC_Expiry
  CookieSessionID: CEC_SessionID
  Status: Status
  Service: Service
  CookieURL: CEC_URL
  MappedSeverity: Severity
  CookieEmail: CEC_Email
  AlertID: AlertID
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities