Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Anvilogic Alert

Back
Id6ccc187a-42ee-4635-8bcc-3b299f8570df
RulenameAnvilogic Alert
DescriptionAlert generated by Anvilogic.
SeverityMedium
Required data connectorsAnvilogic
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Anvilogic/Analytic Rules/Anvilogic_Alerts.yaml
Version1.0.1
Arm template6ccc187a-42ee-4635-8bcc-3b299f8570df.json
Deploy To Azure
Anvilogic_Alerts_CL | where avl_rule_mode!='Warn'
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Anvilogic/Analytic Rules/Anvilogic_Alerts.yaml
queryPeriod: 5m
description: |
    'Alert generated by Anvilogic.'
suppressionEnabled: false
name: Anvilogic Alert
triggerOperator: gt
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: false
    reopenClosedIncident: false
    lookbackDuration: PT5M
kind: Scheduled
requiredDataConnectors:
- connectorId: Anvilogic
  dataTypes:
  - Anvilogic_Alerts_CL
customDetails:
  tactics: avl_mitre_tactic
  raw: raw
  techniques: avl_mitre_technique
triggerThreshold: 0
eventGroupingSettings:
  aggregationKind: AlertPerResult
suppressionDuration: 1h
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: coi_account
  - identifier: NTDomain
    columnName: src_nt_domain
  - identifier: Sid
    columnName: ssid
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: coi_host
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: coi_ip
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: url
- entityType: CloudApplication
  fieldMappings:
  - identifier: Name
    columnName: coi_app
- entityType: File
  fieldMappings:
  - identifier: Name
    columnName: file_name
  - identifier: Directory
    columnName: file_path
- entityType: Process
  fieldMappings:
  - identifier: ProcessId
    columnName: process_id
  - identifier: CommandLine
    columnName: process_exec
- entityType: RegistryKey
  fieldMappings:
  - identifier: Hive
    columnName: registry_hive
  - identifier: Key
    columnName: registry_key_name
- entityType: RegistryValue
  fieldMappings:
  - identifier: Name
    columnName: registry_value_name
  - identifier: Value
    columnName: registry_value_data
  - identifier: ValueType
    columnName: registry_value_type
queryFrequency: 5m
tactics: []
id: 6ccc187a-42ee-4635-8bcc-3b299f8570df
status: Available
version: 1.0.1
query: |
    Anvilogic_Alerts_CL | where avl_rule_mode!='Warn'
alertDetailsOverride:
  alertDescriptionFormat: |-
    avl_rule_id: {{avl_rule_id}} 
    {{avl_definition}}    
  alertTacticsColumnName: avl_mitre_tactic
  alertDisplayNameFormat: '{{avl_rule_id}} - {{avl_use_case_title}} - {{avl_use_case_type}}'
  alertDynamicProperties:
  - alertProperty: Techniques
    value: avl_mitre_technique
severity: Medium
relevantTechniques: []