Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Acronis - Multiple Inboxes with Malicious Content Detected

Back
Id5090ad7b-4b47-4cab-9015-bffb43aecde8
RulenameAcronis - Multiple Inboxes with Malicious Content Detected
DescriptionMany inboxes containing malicious content could indicate a potential ongoing phishing attack.
SeverityMedium
TacticsInitialAccess
TechniquesT1566.002
T1566.001
KindScheduled
Query frequency1h
Query period1d
Trigger threshold2
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleInboxesWithMaliciousContentDetected.yaml
Version1.0.0
Arm template5090ad7b-4b47-4cab-9015-bffb43aecde8.json
Deploy To Azure
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID in
("MaliciousURLDetectedInM365MailboxBackup",
"MalwareDetectedInM365MailboxBackup",
"MaliciousEmailDetectedPerceptionPointWarning")
| summarize MaliciousContent = count() by DeviceName
relevantTechniques:
- T1566.002
- T1566.001
queryFrequency: 1h
triggerOperator: gt
description: Many inboxes containing malicious content could indicate a potential ongoing phishing attack.
triggerThreshold: 2
id: 5090ad7b-4b47-4cab-9015-bffb43aecde8
name: Acronis - Multiple Inboxes with Malicious Content Detected
queryPeriod: 1d
customDetails:
  DeviceName: DeviceName
query: |
  CommonSecurityLog
  | where DeviceVendor == "Acronis"
  | where DeviceEventClassID in
  ("MaliciousURLDetectedInM365MailboxBackup",
  "MalwareDetectedInM365MailboxBackup",
  "MaliciousEmailDetectedPerceptionPointWarning")
  | summarize MaliciousContent = count() by DeviceName  
severity: Medium
eventGroupingSettings:
  aggregationKind: SingleAlert
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    reopenClosedIncident: true
    lookbackDuration: P1D
    matchingMethod: AnyAlert
    enabled: true
entityMappings:
- fieldMappings:
  - columnName: DeviceName
    identifier: HostName
  entityType: Host
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleInboxesWithMaliciousContentDetected.yaml
requiredDataConnectors: []
version: 1.0.0
tactics:
- InitialAccess
kind: Scheduled