Claroty - Policy violation
| Id | 3b22ac47-e02c-4599-a37a-57f965de17be |
| Rulename | Claroty - Policy violation |
| Description | Detects Claroty policy violation events from ClarotyEvent when EventOriginalType or EventType contains ‘Policy Violation’. Use this rule to identify policy enforcement events that may indicate unauthorized discovery or prohibited network activity. This rule expects ClarotyEvent data to be available in the workspace. |
| Severity | High |
| Tactics | Discovery |
| Techniques | T1018 T1135 |
| Required data connectors | CefAma |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Claroty/Analytic Rules/ClarotyPolicyViolation.yaml |
| Version | 1.0.4 |
| Arm template | 3b22ac47-e02c-4599-a37a-57f965de17be.json |
ClarotyEvent
| where EventOriginalType has 'Policy Violation' or EventType has 'Policy Violation'
| project TimeGenerated, DstIpAddr, EventOriginalType, EventType
| extend IPCustomEntity = DstIpAddr
relevantTechniques:
- T1018
- T1135
entityMappings:
- entityType: IP
fieldMappings:
- columnName: IPCustomEntity
identifier: Address
version: 1.0.4
id: 3b22ac47-e02c-4599-a37a-57f965de17be
severity: High
kind: Scheduled
queryFrequency: 1h
description: |
'Detects Claroty policy violation events from ClarotyEvent when EventOriginalType or EventType contains 'Policy
Violation'. Use this rule to identify policy enforcement events that may indicate unauthorized discovery or prohibited network
activity. This rule expects ClarotyEvent data to be available in the workspace.'
requiredDataConnectors:
- connectorId: CefAma
dataTypes:
- CommonSecurityLog
triggerOperator: gt
name: Claroty - Policy violation
tactics:
- Discovery
alertDetailsOverride:
alertDescriptionFormat: 'Claroty reported a policy violation for {{IPCustomEntity}}. EventOriginalType: {{EventOriginalType}}. EventType: {{EventType}}'
alertDisplayNameFormat: Claroty policy violation detected for {{IPCustomEntity}}
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Claroty/Analytic Rules/ClarotyPolicyViolation.yaml
triggerThreshold: 0
queryPeriod: 1h
query: |
ClarotyEvent
| where EventOriginalType has 'Policy Violation' or EventType has 'Policy Violation'
| project TimeGenerated, DstIpAddr, EventOriginalType, EventType
| extend IPCustomEntity = DstIpAddr
status: Available
customDetails:
EventOriginalType: EventOriginalType
EventType: EventType
DestinationIP: DstIpAddr