Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

GitHub Security Vulnerability in Repository

Back
Id5436f471-b03d-41cb-b333-65891f887c43
RulenameGitHub Security Vulnerability in Repository
DescriptionThis alerts when there is a new security vulnerability in a GitHub repository.
SeverityInformational
TacticsInitialAccess
Execution
PrivilegeEscalation
DefenseEvasion
CredentialAccess
LateralMovement
TechniquesT1190
T1203
T1068
T1211
T1212
T1210
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GitHub/Analytic Rules/Security Vulnerability in Repo.yaml
Version1.0.3
Arm template5436f471-b03d-41cb-b333-65891f887c43.json
Deploy To Azure
GitHubRepo
| where Action == "vulnerabilityAlert"
| project TimeGenerated, DismmisedAt, Reason, vulnerableManifestFilename, Description, Link, PublishedAt, Severity, Summary
queryPeriod: 1h
query: |
  GitHubRepo
  | where Action == "vulnerabilityAlert"
  | project TimeGenerated, DismmisedAt, Reason, vulnerableManifestFilename, Description, Link, PublishedAt, Severity, Summary  
name: GitHub Security Vulnerability in Repository
entityMappings:
- fieldMappings:
  - columnName: Link
    identifier: Url
  entityType: URL
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GitHub/Analytic Rules/Security Vulnerability in Repo.yaml
requiredDataConnectors: []
description: |
    'This alerts when there is a new security vulnerability in a GitHub repository.'
kind: Scheduled
version: 1.0.3
queryFrequency: 1h
severity: Informational
relevantTechniques:
- T1190
- T1203
- T1068
- T1211
- T1212
- T1210
triggerOperator: gt
triggerThreshold: 0
tactics:
- InitialAccess
- Execution
- PrivilegeEscalation
- DefenseEvasion
- CredentialAccess
- LateralMovement
id: 5436f471-b03d-41cb-b333-65891f887c43