Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Contrast ADR - Security Incident Alert

Back
Id7ce5956f-48f2-42f5-8e2e-c254e7643c11
RulenameContrast ADR - Security Incident Alert
DescriptionMonitors Contrast ADR security incidents across all applications and environments. This rule creates alerts for all security incidents detected by Contrast Security ADR, providing comprehensive visibility into application security events requiring investigation.
SeverityMedium
TacticsInitialAccess
DefenseEvasion
Discovery
CommandAndControl
TechniquesT1190
T1055
T1018
T1008
Required data connectorsContrastADR
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_Security_ADR_incident.yaml
Version1.0.0
Arm template7ce5956f-48f2-42f5-8e2e-c254e7643c11.json
Deploy To Azure
ContrastADRIncident_CL
query: |
    ContrastADRIncident_CL
version: 1.0.0
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_Security_ADR_incident.yaml
status: Available
description: |
    'Monitors Contrast ADR security incidents across all applications and environments. This rule creates alerts for all security incidents detected by Contrast Security ADR, providing comprehensive visibility into application security events requiring investigation.'
alertDetailsOverride:
  alertDisplayNameFormat: '{{incidentName_s}}'
  alertDescriptionFormat: '{{summary_s}}'
queryFrequency: 5m
name: Contrast ADR - Security Incident Alert
kind: Scheduled
triggerThreshold: 0
id: 7ce5956f-48f2-42f5-8e2e-c254e7643c11
requiredDataConnectors:
- connectorId: ContrastADR
  dataTypes:
  - ContrastADRIncident_CL
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    groupByCustomDetails:
    - IncidentId
    - ApplicationName
    reopenClosedIncident: false
    matchingMethod: Selected
    lookbackDuration: PT1H
    enabled: true
severity: Medium
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryPeriod: 5m
entityMappings:
- fieldMappings:
  - columnName: incidentId_s
    identifier: ObjectGuid
  entityType: SecurityGroup
relevantTechniques:
- T1190
- T1055
- T1018
- T1008
tactics:
- InitialAccess
- DefenseEvasion
- Discovery
- CommandAndControl