Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Contrast ADR - Security Incident Alert

Back
Id7ce5956f-48f2-42f5-8e2e-c254e7643c11
RulenameContrast ADR - Security Incident Alert
DescriptionMonitors Contrast ADR security incidents across all applications and environments. This rule creates alerts for all security incidents detected by Contrast Security ADR, providing comprehensive visibility into application security events requiring investigation.
SeverityMedium
TacticsInitialAccess
DefenseEvasion
Discovery
CommandAndControl
TechniquesT1190
T1055
T1018
T1008
Required data connectorsContrastADR
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_Security_ADR_incident.yaml
Version1.0.0
Arm template7ce5956f-48f2-42f5-8e2e-c254e7643c11.json
Deploy To Azure
ContrastADRIncident_CL
severity: Medium
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryPeriod: 5m
name: Contrast ADR - Security Incident Alert
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_Security_ADR_incident.yaml
entityMappings:
- fieldMappings:
  - columnName: incidentId_s
    identifier: ObjectGuid
  entityType: SecurityGroup
alertDetailsOverride:
  alertDescriptionFormat: '{{summary_s}}'
  alertDisplayNameFormat: '{{incidentName_s}}'
version: 1.0.0
relevantTechniques:
- T1190
- T1055
- T1018
- T1008
status: Available
id: 7ce5956f-48f2-42f5-8e2e-c254e7643c11
queryFrequency: 5m
triggerThreshold: 0
triggerOperator: gt
incidentConfiguration:
  groupingConfiguration:
    lookbackDuration: PT1H
    enabled: true
    matchingMethod: Selected
    reopenClosedIncident: false
    groupByCustomDetails:
    - IncidentId
    - ApplicationName
  createIncident: true
query: |
    ContrastADRIncident_CL
description: |
    'Monitors Contrast ADR security incidents across all applications and environments. This rule creates alerts for all security incidents detected by Contrast Security ADR, providing comprehensive visibility into application security events requiring investigation.'
requiredDataConnectors:
- connectorId: ContrastADR
  dataTypes:
  - ContrastADRIncident_CL
tactics:
- InitialAccess
- DefenseEvasion
- Discovery
- CommandAndControl
kind: Scheduled