Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Contrast ADR - Security Incident Alert

Back
Id7ce5956f-48f2-42f5-8e2e-c254e7643c11
RulenameContrast ADR - Security Incident Alert
DescriptionMonitors Contrast ADR security incidents across all applications and environments. This rule creates alerts for all security incidents detected by Contrast Security ADR, providing comprehensive visibility into application security events requiring investigation.
SeverityMedium
TacticsInitialAccess
DefenseEvasion
Discovery
CommandAndControl
TechniquesT1190
T1055
T1018
T1008
Required data connectorsContrastADR
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_Security_ADR_incident.yaml
Version1.0.0
Arm template7ce5956f-48f2-42f5-8e2e-c254e7643c11.json
Deploy To Azure
ContrastADRIncident_CL
incidentConfiguration:
  groupingConfiguration:
    matchingMethod: Selected
    groupByCustomDetails:
    - IncidentId
    - ApplicationName
    enabled: true
    reopenClosedIncident: false
    lookbackDuration: PT1H
  createIncident: true
query: |
    ContrastADRIncident_CL
name: Contrast ADR - Security Incident Alert
relevantTechniques:
- T1190
- T1055
- T1018
- T1008
status: Available
entityMappings:
- entityType: SecurityGroup
  fieldMappings:
  - columnName: incidentId_s
    identifier: ObjectGuid
queryFrequency: 5m
requiredDataConnectors:
- connectorId: ContrastADR
  dataTypes:
  - ContrastADRIncident_CL
alertDetailsOverride:
  alertDescriptionFormat: '{{summary_s}}'
  alertDisplayNameFormat: '{{incidentName_s}}'
kind: Scheduled
version: 1.0.0
triggerOperator: gt
description: |
    'Monitors Contrast ADR security incidents across all applications and environments. This rule creates alerts for all security incidents detected by Contrast Security ADR, providing comprehensive visibility into application security events requiring investigation.'
tactics:
- InitialAccess
- DefenseEvasion
- Discovery
- CommandAndControl
queryPeriod: 5m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_Security_ADR_incident.yaml
severity: Medium
eventGroupingSettings:
  aggregationKind: AlertPerResult
id: 7ce5956f-48f2-42f5-8e2e-c254e7643c11