Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Theom Medium Risks

Back
Id4cb34832-f73a-49f2-8d38-c2d135c5440b
RulenameTheom Medium Risks
Description“Creates Microsoft Sentinel incidents for medium risk Theom alerts.”
SeverityHigh
TacticsCollection
CommandAndControl
CredentialAccess
DefenseEvasion
Discovery
Exfiltration
Impact
Reconnaissance
TechniquesT1592
T1589
T1070
T1552
T1619
T1119
T1560
T1530
T1213
T1001
T1041
T1537
T1485
T1486
T1565
Required data connectorsTheom
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TheomRisksMedium.yaml
Version1.0.2
Arm template4cb34832-f73a-49f2-8d38-c2d135c5440b.json
Deploy To Azure
TheomAlerts_CL
 | where priority_s == "P3"
query: |
  TheomAlerts_CL
   | where priority_s == "P3"  
entityMappings:
- entityType: CloudApplication
  fieldMappings:
  - columnName: customProps_AssetName_s
    identifier: Name
- entityType: URL
  fieldMappings:
  - columnName: deepLink_s
    identifier: Url
triggerThreshold: 0
name: Theom Medium Risks
severity: High
relevantTechniques:
- T1592
- T1589
- T1070
- T1552
- T1619
- T1119
- T1560
- T1530
- T1213
- T1001
- T1041
- T1537
- T1485
- T1486
- T1565
alertDetailsOverride:
  alertDisplayNameFormat: 'Theom Alert ID: {{id_s}} '
  alertDescriptionFormat: |2

    Summary: {{summary_s}}  
    Additional info: {{details_s}}
    Please investigate further on Theom UI at {{deepLink_s}}
queryPeriod: 5m
tactics:
- Collection
- CommandAndControl
- CredentialAccess
- DefenseEvasion
- Discovery
- Exfiltration
- Impact
- Reconnaissance
requiredDataConnectors:
- connectorId: Theom
  dataTypes:
  - TheomAlerts_CL
queryFrequency: 5m
version: 1.0.2
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TheomRisksMedium.yaml
id: 4cb34832-f73a-49f2-8d38-c2d135c5440b
kind: Scheduled
description: |
    "Creates Microsoft Sentinel incidents for medium risk Theom alerts."
eventGroupingSettings:
  aggregationKind: AlertPerResult
status: Available
triggerOperator: gt