VMware SD-WAN Edge - IDSIPS Alert triggered Search API
| Id | 44f78dbf-9f29-4ec0-aaca-ab5bf0b559af |
| Rulename | VMware SD-WAN Edge - IDS/IPS Alert triggered (Search API) |
| Description | The VMware SD-WAN Edge appliance captured a potentially malicious traffic flow. Please investigate the IOC information available. This analytics rule analyses Search API streams. Search API queries report only IDS/IPS Alerts. In case you would also need Network Flood Protection, please enable Syslog collection using AMA. |
| Severity | High |
| Tactics | LateralMovement |
| Techniques | T1210 |
| Required data connectors | VMwareSDWAN |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sdwan-idps-alert-api.yaml |
| Version | 1.0.0 |
| Arm template | 44f78dbf-9f29-4ec0-aaca-ab5bf0b559af.json |
VMware_SDWAN_FirewallLogs_CL
| project TimeGenerated, signature, severity, category, signatureId, actionTaken, edgeName, sourceIp, protocol, sourcePort, destinationIp, destinationPort, domainName, attackSource, attackTarget, firewallPolicyName
queryFrequency: 1h
customDetails:
IDPS_Event_Category: category
IDPS_Signature: signature
alertDetailsOverride:
alertDynamicProperties: []
tactics:
- LateralMovement
name: VMware SD-WAN Edge - IDS/IPS Alert triggered (Search API)
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sdwan-idps-alert-api.yaml
triggerThreshold: 0
description: |-
The VMware SD-WAN Edge appliance captured a potentially malicious traffic flow. Please investigate the IOC information available.
This analytics rule analyses Search API streams. Search API queries report only IDS/IPS Alerts. In case you would also need Network Flood Protection, please enable Syslog collection using AMA.
kind: Scheduled
entityMappings:
- entityType: DNS
fieldMappings:
- identifier: DomainName
columnName: domainName
- entityType: IP
fieldMappings:
- identifier: Address
columnName: sourceIp
id: 44f78dbf-9f29-4ec0-aaca-ab5bf0b559af
incidentConfiguration:
groupingConfiguration:
lookbackDuration: 1h
reopenClosedIncident: false
groupByCustomDetails: []
matchingMethod: AllEntities
groupByAlertDetails: []
groupByEntities: []
enabled: true
createIncident: true
queryPeriod: 1h
version: 1.0.0
severity: High
relevantTechniques:
- T1210
requiredDataConnectors:
- connectorId: VMwareSDWAN
dataTypes:
- SDWAN
suppressionEnabled: false
eventGroupingSettings:
aggregationKind: AlertPerResult
triggerOperator: gt
suppressionDuration: 5h
query: |
VMware_SDWAN_FirewallLogs_CL
| project TimeGenerated, signature, severity, category, signatureId, actionTaken, edgeName, sourceIp, protocol, sourcePort, destinationIp, destinationPort, domainName, attackSource, attackTarget, firewallPolicyName