Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Malware Detection Exclusions List Updated

Back
Id401e91cb-b53f-41a5-b066-1c028b3b51db
RulenameMalware Detection Exclusions List Updated
DescriptionDetects when malware detection exclusions are updated. This might indicate potential compromise of backup data.
SeverityMedium
Required data connectorsSyslog
SyslogAma
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Veeam/Analytic Rules/Malware_Detection_Exclusions_List_Updated.yaml
Version1.0.1
Arm template401e91cb-b53f-41a5-b066-1c028b3b51db.json
Deploy To Azure
Veeam_GetSecurityEvents
| where instanceId == 42280
| project
  Date = format_datetime(TimeGenerated, 'dd.MM.yyyy HH:mm'),
    DataSource = original_host,
    EventId = instanceId,
    UserName = user,
   MessageDetails = Description,
   Severity = SeverityDescription
| project Date, DataSource, EventId, UserName,MessageDetails,Severity
kind: Scheduled
eventGroupingSettings:
  aggregationKind: AlertPerResult
description: Detects when malware detection exclusions are updated. This might indicate potential compromise of backup data.
severity: Medium
queryFrequency: 5m
customDetails:
  MessageDetails: MessageDetails
  VbrHostName: DataSource
  Date: Date
  EventId: EventId
  Severity: Severity
triggerThreshold: 0
relevantTechniques: []
status: Available
tactics: []
name: Malware Detection Exclusions List Updated
id: 401e91cb-b53f-41a5-b066-1c028b3b51db
query: |-
  Veeam_GetSecurityEvents
  | where instanceId == 42280
  | project
    Date = format_datetime(TimeGenerated, 'dd.MM.yyyy HH:mm'),
      DataSource = original_host,
      EventId = instanceId,
      UserName = user,
     MessageDetails = Description,
     Severity = SeverityDescription
  | project Date, DataSource, EventId, UserName,MessageDetails,Severity  
requiredDataConnectors:
- dataTypes:
  - Syslog
  connectorId: Syslog
- dataTypes:
  - Syslog
  connectorId: SyslogAma
version: 1.0.1
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Veeam/Analytic Rules/Malware_Detection_Exclusions_List_Updated.yaml
queryPeriod: 5m
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/401e91cb-b53f-41a5-b066-1c028b3b51db')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/401e91cb-b53f-41a5-b066-1c028b3b51db')]",
      "properties": {
        "alertRuleTemplateName": "401e91cb-b53f-41a5-b066-1c028b3b51db",
        "customDetails": {
          "Date": "Date",
          "EventId": "EventId",
          "MessageDetails": "MessageDetails",
          "Severity": "Severity",
          "VbrHostName": "DataSource"
        },
        "description": "Detects when malware detection exclusions are updated. This might indicate potential compromise of backup data.",
        "displayName": "Malware Detection Exclusions List Updated",
        "enabled": true,
        "entityMappings": null,
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Veeam/Analytic Rules/Malware_Detection_Exclusions_List_Updated.yaml",
        "query": "Veeam_GetSecurityEvents\n| where instanceId == 42280\n| project\n  Date = format_datetime(TimeGenerated, 'dd.MM.yyyy HH:mm'),\n    DataSource = original_host,\n    EventId = instanceId,\n    UserName = user,\n   MessageDetails = Description,\n   Severity = SeverityDescription\n| project Date, DataSource, EventId, UserName,MessageDetails,Severity",
        "queryFrequency": "PT5M",
        "queryPeriod": "PT5M",
        "severity": "Medium",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [],
        "techniques": [],
        "templateVersion": "1.0.1",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}