Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Radiflow - Unauthorized Command in Operational Device

Back
Id4d90d485-6d47-417e-80ea-9cf956c1a671
RulenameRadiflow - Unauthorized Command in Operational Device
DescriptionGenerates an incident when an unauthorized command is detected in the network by Radiflow’s iSID.
SeverityMedium
TacticsExecution
LateralMovement
InhibitResponseFunction
ImpairProcessControl
TechniquesT0858
T0843
T0816
T0857
T0836
T0855
Required data connectorsRadiflowIsid
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Radiflow/Analytic Rules/RadiflowUnauthorizedCommandinOperationalDevice.yaml
Version1.0.0
Arm template4d90d485-6d47-417e-80ea-9cf956c1a671.json
Deploy To Azure
RadiflowEvent
| where DeviceProduct =~ 'iSID'
| where 
    (
        EventClassID in (114, 115, 116, 117, 118, 119, 162)
        or EventMessage has 'Unauthorized'
    )
customDetails:
  SourceMAC: SourceMACAddress
  SourceVendor: SourceVendor
  DestinationHostName: DestinationHostName
  DestinationIP: DestinationIP
  DestinationType: DestinationType
  SourceIP: SourceIP
  SourceType: SourceType
  DestinationMAC: DestinationMACAddress
  Protocol: Protocol
  Port: Port
  DestinationVendor: DestinationVendor
  SourceVLAN: SourceVLAN
  SourceHostName: SourceHostName
version: 1.0.0
suppressionDuration: 5h
description: |
    'Generates an incident when an unauthorized command is detected in the network by Radiflow's iSID.'
severity: Medium
query: |
  RadiflowEvent
  | where DeviceProduct =~ 'iSID'
  | where 
      (
          EventClassID in (114, 115, 116, 117, 118, 119, 162)
          or EventMessage has 'Unauthorized'
      )  
requiredDataConnectors:
- dataTypes:
  - RadiflowEvent
  connectorId: RadiflowIsid
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Radiflow/Analytic Rules/RadiflowUnauthorizedCommandinOperationalDevice.yaml
status: Available
triggerThreshold: 0
queryPeriod: 1h
incidentConfiguration:
  groupingConfiguration:
    matchingMethod: AllEntities
    reopenClosedIncident: false
    groupByAlertDetails: []
    lookbackDuration: 1h
    groupByCustomDetails: []
    enabled: true
    groupByEntities: []
  createIncident: true
tactics:
- Execution
- LateralMovement
- InhibitResponseFunction
- ImpairProcessControl
suppressionEnabled: false
relevantTechniques:
- T0858
- T0843
- T0816
- T0857
- T0836
- T0855
id: 4d90d485-6d47-417e-80ea-9cf956c1a671
alertDetailsOverride:
  alertSeverityColumnName: EventSeverity
  alertDescriptionFormat: "An unauthorized command has been detected. Please check the alert details for further information.\n\nMessage: {{EventMessage}}\nSource device: {{SourceIP}} \nDestination device (if any): {{DestinationIP}} "
  alertDynamicProperties: []
  alertDisplayNameFormat: Unauthorized Command in Operational Device
triggerOperator: gt
name: Radiflow - Unauthorized Command in Operational Device
eventGroupingSettings:
  aggregationKind: AlertPerResult
entityMappings:
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: SourceHostName
  - identifier: NetBiosName
    columnName: SourceHostName
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: DestinationHostName
  - identifier: NetBiosName
    columnName: DestinationHostName
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: SourceIP
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: DestinationIP
kind: Scheduled
queryFrequency: 1h