Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Process-Level Anomaly

Back
Id3fa85f64-5717-4562-b3fc-2c963f66afa6
RulenameProcess-Level Anomaly
DescriptionTriggers an incident when the same process name appears in 50 or more alerts across multiple devices, suggesting widespread activity.
SeverityMedium
TacticsExecution
DefenseEvasion
TechniquesT1059
T1204
Required data connectorsMorphisecCCF
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Morphisec/Analytic Rules/MorphisecProcessLevelAnomaly.yaml
Version1.0.0
Arm template3fa85f64-5717-4562-b3fc-2c963f66afa6.json
Deploy To Azure
MorphisecAlerts_CL
| where threatMessageArrivalTime >= ago(24h)
| summarize 
    AlertCount = dcount(id),
    DeviceCount = dcount(hostname)
    by application
| where AlertCount >= 50 and DeviceCount > 1
kind: Scheduled
customDetails:
  ProcessName: application
suppressionDuration: 5h
description: |
    'Triggers an incident when the same process name appears in 50 or more alerts across multiple devices, suggesting widespread activity.'
severity: Medium
queryFrequency: 1d
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    matchingMethod: AllEntities
    lookbackDuration: 5h
    enabled: false
  createIncident: true
triggerThreshold: 0
relevantTechniques:
- T1059
- T1204
eventGroupingSettings:
  aggregationKind: SingleAlert
suppressionEnabled: false
status: Available
tactics:
- Execution
- DefenseEvasion
name: Process-Level Anomaly
id: 3fa85f64-5717-4562-b3fc-2c963f66afa6
query: |
  MorphisecAlerts_CL
  | where threatMessageArrivalTime >= ago(24h)
  | summarize 
      AlertCount = dcount(id),
      DeviceCount = dcount(hostname)
      by application
  | where AlertCount >= 50 and DeviceCount > 1  
requiredDataConnectors:
- dataTypes:
  - Morphisec
  connectorId: MorphisecCCF
version: 1.0.0
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Morphisec/Analytic Rules/MorphisecProcessLevelAnomaly.yaml
queryPeriod: 1d
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/3fa85f64-5717-4562-b3fc-2c963f66afa6')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/3fa85f64-5717-4562-b3fc-2c963f66afa6')]",
      "properties": {
        "alertRuleTemplateName": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
        "customDetails": {
          "ProcessName": "application"
        },
        "description": "'Triggers an incident when the same process name appears in 50 or more alerts across multiple devices, suggesting widespread activity.'\n",
        "displayName": "Process-Level Anomaly",
        "enabled": true,
        "entityMappings": null,
        "eventGroupingSettings": {
          "aggregationKind": "SingleAlert"
        },
        "incidentConfiguration": {
          "createIncident": true,
          "groupingConfiguration": {
            "enabled": false,
            "lookbackDuration": "PT5H",
            "matchingMethod": "AllEntities",
            "reopenClosedIncident": false
          }
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Morphisec/Analytic Rules/MorphisecProcessLevelAnomaly.yaml",
        "query": "MorphisecAlerts_CL\n| where threatMessageArrivalTime >= ago(24h)\n| summarize \n    AlertCount = dcount(id),\n    DeviceCount = dcount(hostname)\n    by application\n| where AlertCount >= 50 and DeviceCount > 1\n",
        "queryFrequency": "P1D",
        "queryPeriod": "P1D",
        "severity": "Medium",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT5H",
        "suppressionEnabled": false,
        "tactics": [
          "DefenseEvasion",
          "Execution"
        ],
        "techniques": [
          "T1059",
          "T1204"
        ],
        "templateVersion": "1.0.0",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}