let threshold = 10;
QualysHostDetection
| where Severity == "5"
| summarize StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by NetBios, IPAddress
| where count_ >= threshold
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/QualysVM/Analytic Rules/HighNumberofVulnDetectedV2.yaml
query: |
let threshold = 10;
QualysHostDetection
| where Severity == "5"
| summarize StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by NetBios, IPAddress
| where count_ >= threshold
requiredDataConnectors:
- dataTypes:
- QualysHostDetection
connectorId: QualysVMLogsCCPDefinition
tactics:
- InitialAccess
name: High Number of Urgent Vulnerabilities Detected
relevantTechniques:
- T1190
severity: Medium
entityMappings:
- fieldMappings:
- identifier: FullName
columnName: NetBios
entityType: Host
- fieldMappings:
- identifier: Address
columnName: IPAddress
entityType: IP
kind: Scheduled
queryFrequency: 1h
description: |
'This Creates an incident when a host has a high number of Urgent, severity 5, vulnerabilities detected.'
triggerThreshold: 0
triggerOperator: gt
version: 1.0.3
queryPeriod: 1h
id: 3edb7215-250b-40c0-8b46-79093949242d