Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Acronis - Multiple Inboxes with Malicious Content Detected

Back
Id5090ad7b-4b47-4cab-9015-bffb43aecde8
RulenameAcronis - Multiple Inboxes with Malicious Content Detected
DescriptionMany inboxes containing malicious content could indicate a potential ongoing phishing attack.
SeverityMedium
TacticsInitialAccess
TechniquesT1566.002
T1566.001
KindScheduled
Query frequency1h
Query period1d
Trigger threshold2
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleInboxesWithMaliciousContentDetected.yaml
Version1.0.0
Arm template5090ad7b-4b47-4cab-9015-bffb43aecde8.json
Deploy To Azure
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID in
("MaliciousURLDetectedInM365MailboxBackup",
"MalwareDetectedInM365MailboxBackup",
"MaliciousEmailDetectedPerceptionPointWarning")
| summarize MaliciousContent = count() by DeviceName
name: Acronis - Multiple Inboxes with Malicious Content Detected
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: P1D
    enabled: true
    matchingMethod: AnyAlert
    reopenClosedIncident: true
queryPeriod: 1d
eventGroupingSettings:
  aggregationKind: SingleAlert
requiredDataConnectors: []
id: 5090ad7b-4b47-4cab-9015-bffb43aecde8
kind: Scheduled
triggerThreshold: 2
entityMappings:
- entityType: Host
  fieldMappings:
  - columnName: DeviceName
    identifier: HostName
relevantTechniques:
- T1566.002
- T1566.001
queryFrequency: 1h
tactics:
- InitialAccess
triggerOperator: gt
query: |
  CommonSecurityLog
  | where DeviceVendor == "Acronis"
  | where DeviceEventClassID in
  ("MaliciousURLDetectedInM365MailboxBackup",
  "MalwareDetectedInM365MailboxBackup",
  "MaliciousEmailDetectedPerceptionPointWarning")
  | summarize MaliciousContent = count() by DeviceName  
version: 1.0.0
description: Many inboxes containing malicious content could indicate a potential ongoing phishing attack.
severity: Medium
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleInboxesWithMaliciousContentDetected.yaml
customDetails:
  DeviceName: DeviceName