PurviewDataSensitivityLogs
| where Classification contains "Social Security Number"
//| where SourceRegion == "westeurope"
//| where SourceType contains "Amazon"
| where TimeGenerated > ago(24h)
requiredDataConnectors:
- dataTypes:
- PurviewDataSensitivityLogs
connectorId: MicrosoftAzurePurview
relevantTechniques:
- T1087
triggerOperator: gt
customDetails:
PurviewAccount: PurviewAccountName
SourceRegion: SourceRegion
AssetName: AssetName
LastScanTime: AssetLastScanTime
AssetPath: AssetPath
Classification: Classification
queryFrequency: 1d
severity: Informational
triggerThreshold: 0
entityMappings:
- fieldMappings:
- columnName: SourcePath
identifier: ResourceId
entityType: AzureResource
- fieldMappings:
- columnName: AssetName
identifier: Name
entityType: File
- fieldMappings:
- columnName: PurviewAccountName
identifier: Name
entityType: Account
alertDetailsOverride:
alertDescriptionFormat: Within the last 24 hours, Microsoft Purview scanned assets that contained classifications. The classifications discovered include {{Classification}}.
alertDisplayNameFormat: Sensitive Data Discovered in the Last 24 Hours by Microsoft Purview
name: Sensitive Data Discovered in the Last 24 Hours - Customized
query: |
PurviewDataSensitivityLogs
| where Classification contains "Social Security Number"
//| where SourceRegion == "westeurope"
//| where SourceType contains "Amazon"
| where TimeGenerated > ago(24h)
version: 1.0.1
tactics:
- Discovery
queryPeriod: 1d
description: |
'Customized query used to identify specific classifications and parameters that have been discovered on assets in the last 24 hours by Microsoft Purview. By default, the query identifies Social Security Numbers detected, but the specific classification monitored along with other data fields can be adjusted. A list of supported Microsoft Purview classifications can be found here: https://docs.microsoft.com/azure/purview/supported-classifications'
kind: Scheduled
id: 79f296d9-e6e4-45dc-9ca7-1770955435fa
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Purview/Analytic Rules/MicrosoftPurviewSensitiveDataDiscoveredCustom.yaml