let threshold = 10;
QualysHostDetection
| where Severity == "5"
| summarize StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by NetBios, IPAddress
| where count_ >= threshold
name: High Number of Urgent Vulnerabilities Detected
query: |
let threshold = 10;
QualysHostDetection
| where Severity == "5"
| summarize StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by NetBios, IPAddress
| where count_ >= threshold
queryFrequency: 1h
triggerOperator: gt
requiredDataConnectors:
- dataTypes:
- QualysHostDetection
connectorId: QualysVMLogsCCPDefinition
status: Available
entityMappings:
- entityType: Host
fieldMappings:
- identifier: FullName
columnName: NetBios
- entityType: IP
fieldMappings:
- identifier: Address
columnName: IPAddress
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/QualysVM/Analytic Rules/HighNumberofVulnDetectedV2.yaml
description: |
'This Creates an incident when a host has a high number of Urgent, severity 5, vulnerabilities detected.'
version: 1.0.3
id: 3edb7215-250b-40c0-8b46-79093949242d
kind: Scheduled
relevantTechniques:
- T1190
severity: Medium
tactics:
- InitialAccess
queryPeriod: 1h