Syslog
| where SyslogMessage contains "found an infected file"
| extend
EdgeFiler = extract("Edge filer (\\w+)", 1, SyslogMessage),
DetectionTime = extract("found an infected file at ([^ ]+)", 1, SyslogMessage),
Portal = extract("from portal: (\\w+)", 1, SyslogMessage),
FilePath = extract("The file path is: ([^\\.]+)", 1, SyslogMessage),
Virus = extract("The virus is: ([^\\.]+)", 1, SyslogMessage)
| project TimeGenerated, EdgeFiler, DetectionTime, Portal, FilePath, Virus
suppressionEnabled: false
relevantTechniques:
- T1203
entityMappings:
- fieldMappings:
- columnName: EdgeFiler
identifier: HostName
entityType: Host
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
lookbackDuration: PT5H
createIncident: true
version: 1.0.0
suppressionDuration: PT5H
description: Monitors CTERA platform to detect files infected with viruses identified by the antivirus engine on Edge Filers.
customDetails:
FilePath: FilePath
Virus: Virus
Portal: Portal
EdgeFiler: EdgeFiler
requiredDataConnectors:
- connectorId: CTERA
dataTypes:
- Syslog
alertDetailsOverride:
alertnameFormat: Antivirus Detected an Infected File
alertDescriptionFormat: Antivirus detected an infected file on {{EdgeFiler}} at {{DetectionTime}}.
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTERA/Analytic Rules/InfectedFileDetected.yaml
id: 4f767afa-d666-4ed4-b453-a4f5ad35181b
eventGroupingSettings:
aggregationKind: SingleAlert
query: |
Syslog
| where SyslogMessage contains "found an infected file"
| extend
EdgeFiler = extract("Edge filer (\\w+)", 1, SyslogMessage),
DetectionTime = extract("found an infected file at ([^ ]+)", 1, SyslogMessage),
Portal = extract("from portal: (\\w+)", 1, SyslogMessage),
FilePath = extract("The file path is: ([^\\.]+)", 1, SyslogMessage),
Virus = extract("The virus is: ([^\\.]+)", 1, SyslogMessage)
| project TimeGenerated, EdgeFiler, DetectionTime, Portal, FilePath, Virus
severity: High
status: Available
name: Antivirus Detected an Infected File
tactics:
- Impact
kind: NRT