Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Process-Level Anomaly

Back
Id3fa85f64-5717-4562-b3fc-2c963f66afa6
RulenameProcess-Level Anomaly
DescriptionTriggers an incident when the same process name appears in 50 or more alerts across multiple devices, suggesting widespread activity.
SeverityMedium
TacticsExecution
DefenseEvasion
TechniquesT1059
T1204
Required data connectorsMorphisecCCF
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Morphisec/Analytic Rules/MorphisecProcessLevelAnomaly.yaml
Version1.0.0
Arm template3fa85f64-5717-4562-b3fc-2c963f66afa6.json
Deploy To Azure
MorphisecAlerts_CL
| where threatMessageArrivalTime >= ago(24h)
| summarize 
    AlertCount = dcount(id),
    DeviceCount = dcount(hostname)
    by application
| where AlertCount >= 50 and DeviceCount > 1
incidentConfiguration:
  groupingConfiguration:
    lookbackDuration: 5h
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities
  createIncident: true
id: 3fa85f64-5717-4562-b3fc-2c963f66afa6
query: |
  MorphisecAlerts_CL
  | where threatMessageArrivalTime >= ago(24h)
  | summarize 
      AlertCount = dcount(id),
      DeviceCount = dcount(hostname)
      by application
  | where AlertCount >= 50 and DeviceCount > 1  
description: |
    'Triggers an incident when the same process name appears in 50 or more alerts across multiple devices, suggesting widespread activity.'
requiredDataConnectors:
- connectorId: MorphisecCCF
  dataTypes:
  - Morphisec
tactics:
- Execution
- DefenseEvasion
status: Available
queryFrequency: 1d
queryPeriod: 1d
suppressionEnabled: false
triggerOperator: gt
kind: Scheduled
name: Process-Level Anomaly
customDetails:
  ProcessName: application
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Morphisec/Analytic Rules/MorphisecProcessLevelAnomaly.yaml
version: 1.0.0
eventGroupingSettings:
  aggregationKind: SingleAlert
relevantTechniques:
- T1059
- T1204
suppressionDuration: 5h
severity: Medium
triggerThreshold: 0