TLS Certificate Hostname Mismatch
| Id | 69761091-1a9a-49a9-8966-be68cd550766 |
| Rulename | TLS Certificate Hostname Mismatch |
| Description | TLS Certificate Hostname Mismatch |
| Severity | Medium |
| Tactics | CredentialAccess DefenseEvasion Persistence |
| Techniques | T1556 |
| Required data connectors | HVPollingIDAzureFunctions |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/TLSCertificateHostnameMismatch.yaml |
| Version | 1.0.3 |
| Arm template | 69761091-1a9a-49a9-8966-be68cd550766.json |
HackerViewLog_Azure_1_CL | where severity_s == "medium" | where progress_status_s == "New" | where status_s != "inactive" | where issue_name_s == "TLS Certificate Hostname Mismatch"
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/TLSCertificateHostnameMismatch.yaml
kind: Scheduled
suppressionDuration: 5h
queryFrequency: 5m
query: 'HackerViewLog_Azure_1_CL | where severity_s == "medium" | where progress_status_s == "New" | where status_s != "inactive" | where issue_name_s == "TLS Certificate Hostname Mismatch" '
relevantTechniques:
- T1556
name: TLS Certificate Hostname Mismatch
requiredDataConnectors:
- dataTypes:
- HackerViewLog_Azure_1_CL
connectorId: HVPollingIDAzureFunctions
eventGroupingSettings:
aggregationKind: SingleAlert
description: |
'TLS Certificate Hostname Mismatch'
triggerThreshold: 0
incidentConfiguration:
groupingConfiguration:
enabled: false
matchingMethod: AllEntities
reopenClosedIncident: false
lookbackDuration: PT5H
createIncident: true
queryPeriod: 5m
version: 1.0.3
suppressionEnabled: false
status: Available
triggerOperator: gt
entityMappings:
- entityType: IP
fieldMappings:
- columnName: meta_resolved_ip_s
identifier: Address
- entityType: Host
fieldMappings:
- columnName: meta_host_s
identifier: HostName
- entityType: URL
fieldMappings:
- columnName: hackerview_link_s
identifier: Url
tactics:
- CredentialAccess
- DefenseEvasion
- Persistence
severity: Medium
id: 69761091-1a9a-49a9-8966-be68cd550766