Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Bitglass - The SmartEdge endpoint agent was uninstalled

Back
Id40f69a27-8c68-4c8c-bb7c-7eb0f0a8a1fa
RulenameBitglass - The SmartEdge endpoint agent was uninstalled
DescriptionDetects when SmartEdge endpoint agent was uninstalled.
SeverityMedium
TacticsDefenseEvasion
TechniquesT1070
Required data connectorsBitglass
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Bitglass/Analytic Rules/BitglassSmartEdgeAgentUninstall.yaml
Version1.0.0
Arm template40f69a27-8c68-4c8c-bb7c-7eb0f0a8a1fa.json
Deploy To Azure
Bitglass
| where EventType =~ 'access'
| where EventResultDetails startswith 'The SmartEdge endpoint agent was uninstalled'
| extend IPCustomEntity = SrcIpAddr
name: Bitglass - The SmartEdge endpoint agent was uninstalled
id: 40f69a27-8c68-4c8c-bb7c-7eb0f0a8a1fa
description: |
    'Detects when SmartEdge endpoint agent was uninstalled.'
triggerThreshold: 0
entityMappings:
- fieldMappings:
  - columnName: IPCustomEntity
    identifier: Address
  entityType: IP
version: 1.0.0
triggerOperator: gt
query: |
  Bitglass
  | where EventType =~ 'access'
  | where EventResultDetails startswith 'The SmartEdge endpoint agent was uninstalled'
  | extend IPCustomEntity = SrcIpAddr  
tactics:
- DefenseEvasion
kind: Scheduled
queryFrequency: 1h
severity: Medium
queryPeriod: 1h
requiredDataConnectors:
- dataTypes:
  - Bitglass
  connectorId: Bitglass
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Bitglass/Analytic Rules/BitglassSmartEdgeAgentUninstall.yaml
relevantTechniques:
- T1070