Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Dynatrace - Problem detection

Back
Id415978ff-074e-4203-824a-b06153d77bf7
RulenameDynatrace - Problem detection
DescriptionDetect application & infrastructure problems in your environment
SeverityInformational
TacticsDefenseEvasion
Execution
Impact
InitialAccess
LateralMovement
Persistence
PrivilegeEscalation
TechniquesT1140
T1059
T1565
T1659
T1210
T1554
T1548
Required data connectorsDynatraceProblems
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/Dynatrace_ProblemDetection.yaml
Version1.0.3
Arm template415978ff-074e-4203-824a-b06153d77bf7.json
Deploy To Azure
DynatraceProblems
| summarize  arg_max(StartTime, *) by ProblemId
triggerThreshold: 0
queryFrequency: 1d
description: |
    'Detect application & infrastructure problems in your environment'
eventGroupingSettings:
  aggregationKind: AlertPerResult
query: |
  DynatraceProblems
  | summarize  arg_max(StartTime, *) by ProblemId  
customDetails:
  ImpactLevel: ImpactLevel
  DisplayIdentifier: DisplayId
  ProblemIdentifier: ProblemId
  SeverityLevel: SeverityLevel
alertDetailsOverride:
  alertSeverityColumnName: Severity
  alertDescriptionFormat: |
        A application and/or infrastructure problem has been detected in your environment
  alertDisplayNameFormat: 'Dynatrace problem detected - {{DisplayId}} : {{Title}}'
severity: Informational
version: 1.0.3
id: 415978ff-074e-4203-824a-b06153d77bf7
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/Dynatrace_ProblemDetection.yaml
name: Dynatrace - Problem detection
requiredDataConnectors:
- connectorId: DynatraceProblems
  dataTypes:
  - DynatraceProblems
relevantTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
triggerOperator: gt
incidentConfiguration:
  createIncident: false
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: false
    lookbackDuration: PT5H
    reopenClosedIncident: false
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
kind: Scheduled
queryPeriod: 1d