AlertEvidence
| where EntityType in ("Device", "User")
kind: Scheduled
incidentConfiguration:
groupingConfiguration:
matchingMethod: AllEntities
enabled: false
reopenClosedIncident: false
lookbackDuration: PT5H
createIncident: false
queryFrequency: 60m
triggerThreshold: 0
queryPeriod: 60m
relevantTechniques:
- T1546
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: AccountName
- entityType: IP
fieldMappings:
- identifier: Address
columnName: LocalIP
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: DeviceName
query: |
AlertEvidence
| where EntityType in ("Device", "User")
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
dataTypes:
- AlertEvidence
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Defender_Alert_Evidence.yaml
suppressionEnabled: false
type: Microsoft.OperationalInsights/workspaces/providers/alertRules
name: Defender Alert Evidence
status: Available
eventGroupingSettings:
aggregationKind: SingleAlert
description: This analytic rule is looking for new alert evidence from Microsoft Defender for Endpoint. The intent is to create entries in the SecurityAlert table for every new alert evidence attached to an entity of type Device or User monitored by Defender for Endpoint.
id: 8138863e-e55f-4f02-ac94-72796e203d27
version: 1.0.0
triggerOperator: GreaterThan
tactics:
- Persistence
severity: High
suppressionDuration: PT5H