Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Mimecast Secure Email Gateway - AV

Back
Id33bf0cc9-e568-42bf-9571-c22adf7be66d
RulenameMimecast Secure Email Gateway - AV
DescriptionDetects threats from email anti virus scan.
SeverityInformational
TacticsExecution
TechniquesT1053
Required data connectorsMimecastSEGAPI
KindScheduled
Query frequency15m
Query period15m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastSEG/MimecastCG_AV.yaml
Version1.0.0
Arm template33bf0cc9-e568-42bf-9571-c22adf7be66d.json
Deploy To Azure
MimecastCG
| where Type == "email_antivirus"
| extend  SenderEnvelope = ['Sender Envelope'] 
suppressionEnabled: false
name: Mimecast Secure Email Gateway - AV
relevantTechniques:
- T1053
id: 33bf0cc9-e568-42bf-9571-c22adf7be66d
enabled: true
requiredDataConnectors:
- dataTypes:
  - MimecastCG
  connectorId: MimecastSEGAPI
eventGroupingSettings:
  aggregationKind: AlertPerResult
version: 1.0.0
severity: Informational
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastSEG/MimecastCG_AV.yaml
queryPeriod: 15m
entityMappings:
- fieldMappings:
  - identifier: Sender
    columnName: SenderEnvelope
  - identifier: Recipient
    columnName: Recipients
  - identifier: Subject
    columnName: Subject
  entityType: MailMessage
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    matchingMethod: AllEntities
    lookbackDuration: P7D
    enabled: true
  createIncident: true
queryFrequency: 15m
suppressionDuration: 5h
status: Available
query: |
  MimecastCG
  | where Type == "email_antivirus"
  | extend  SenderEnvelope = ['Sender Envelope']   
tactics:
- Execution
kind: Scheduled
description: |
    'Detects threats from email anti virus scan.'
triggerOperator: gt