Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Discord Keyword

Back
Id601a5859-0dc2-452d-8d1e-66dc651c16d5
RulenameCyble Vision Alerts Discord Keyword
DescriptionTriggers when monitored keywords or risky content appear in Discord channels. Useful for detecting data leakage, impersonation, abuse or reputational threats originating from social platforms.
SeverityLow
TacticsReconnaissance
InitialAccess
TechniquesT1598
T1664
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_discord_rule.yaml
Version1.0.0
Arm template601a5859-0dc2-452d-8d1e-66dc651c16d5.json
Deploy To Azure
Alerts_discord  
| where Service == "discord" 
| extend MappedSeverity = Severity
name: Cyble Vision Alerts Discord Keyword
id: 601a5859-0dc2-452d-8d1e-66dc651c16d5
enabled: true
entityMappings:
- fieldMappings:
  - columnName: DC_AuthorID
    identifier: AadUserId
  - columnName: DC_AuthorUsername
    identifier: Name
  entityType: Account
- fieldMappings:
  - columnName: DC_ServerName
    identifier: Name
  entityType: CloudApplication
version: 1.0.0
triggerOperator: GreaterThan
query: |
  Alerts_discord  
  | where Service == "discord" 
  | extend MappedSeverity = Severity  
description: |
    'Triggers when monitored keywords or risky content appear in Discord channels. Useful for detecting data leakage, impersonation, abuse or reputational threats originating from social platforms.'
kind: Scheduled
queryfrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_discord_rule.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  alertDisplayNameFormat: Discord Alert Risky Content by {{DC_AuthorUsername}}
  alertDetailsOverride: 
  alertDescriptionFormat: |
    A monitored keyword or harmful content was detected in Discord.
    **Server:** {{DC_ServerName}}
    **Channel:** {{DC_ChannelName}}
    **Message:** {{DC_Content}}    
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  AlertID: AlertID
  DC_AuthorUsername: DC_AuthorUsername
  DC_MessageID: DC_MessageID
  DC_Content: DC_Content
  DC_ServerName: DC_ServerName
  Service: Service
  Status: Status
  MappedSeverity: Severity
  DC_ChannelName: DC_ChannelName
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1598
- T1664
tactics:
- Reconnaissance
- InitialAccess