VMware SD-WAN Edge - IDSIPS Alert triggered Search API
| Id | 44f78dbf-9f29-4ec0-aaca-ab5bf0b559af |
| Rulename | VMware SD-WAN Edge - IDS/IPS Alert triggered (Search API) |
| Description | The VMware SD-WAN Edge appliance captured a potentially malicious traffic flow. Please investigate the IOC information available. This analytics rule analyses Search API streams. Search API queries report only IDS/IPS Alerts. In case you would also need Network Flood Protection, please enable Syslog collection using AMA. |
| Severity | High |
| Tactics | LateralMovement |
| Techniques | T1210 |
| Required data connectors | VMwareSDWAN |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sdwan-idps-alert-api.yaml |
| Version | 1.0.0 |
| Arm template | 44f78dbf-9f29-4ec0-aaca-ab5bf0b559af.json |
VMware_SDWAN_FirewallLogs_CL
| project TimeGenerated, signature, severity, category, signatureId, actionTaken, edgeName, sourceIp, protocol, sourcePort, destinationIp, destinationPort, domainName, attackSource, attackTarget, firewallPolicyName
queryPeriod: 1h
query: |
VMware_SDWAN_FirewallLogs_CL
| project TimeGenerated, signature, severity, category, signatureId, actionTaken, edgeName, sourceIp, protocol, sourcePort, destinationIp, destinationPort, domainName, attackSource, attackTarget, firewallPolicyName
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sdwan-idps-alert-api.yaml
name: VMware SD-WAN Edge - IDS/IPS Alert triggered (Search API)
entityMappings:
- fieldMappings:
- columnName: domainName
identifier: DomainName
entityType: DNS
- fieldMappings:
- columnName: sourceIp
identifier: Address
entityType: IP
eventGroupingSettings:
aggregationKind: AlertPerResult
suppressionEnabled: false
alertDetailsOverride:
alertDynamicProperties: []
description: |-
The VMware SD-WAN Edge appliance captured a potentially malicious traffic flow. Please investigate the IOC information available.
This analytics rule analyses Search API streams. Search API queries report only IDS/IPS Alerts. In case you would also need Network Flood Protection, please enable Syslog collection using AMA.
kind: Scheduled
version: 1.0.0
suppressionDuration: 5h
queryFrequency: 1h
severity: High
requiredDataConnectors:
- connectorId: VMwareSDWAN
dataTypes:
- SDWAN
triggerOperator: gt
triggerThreshold: 0
incidentConfiguration:
groupingConfiguration:
matchingMethod: AllEntities
reopenClosedIncident: false
groupByEntities: []
groupByAlertDetails: []
lookbackDuration: 1h
groupByCustomDetails: []
enabled: true
createIncident: true
customDetails:
IDPS_Signature: signature
IDPS_Event_Category: category
tactics:
- LateralMovement
id: 44f78dbf-9f29-4ec0-aaca-ab5bf0b559af
relevantTechniques:
- T1210