AlertEvidence
| where EntityType in ("Device", "User")
suppressionEnabled: false
description: This analytic rule is looking for new alert evidence from Microsoft Defender for Endpoint. The intent is to create entries in the SecurityAlert table for every new alert evidence attached to an entity of type Device or User monitored by Defender for Endpoint.
kind: Scheduled
tactics:
- Persistence
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
dataTypes:
- AlertEvidence
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
lookbackDuration: PT5H
enabled: false
matchingMethod: AllEntities
createIncident: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Defender_Alert_Evidence.yaml
severity: High
name: Defender Alert Evidence
suppressionDuration: PT5H
eventGroupingSettings:
aggregationKind: SingleAlert
triggerThreshold: 0
queryPeriod: 60m
query: |
AlertEvidence
| where EntityType in ("Device", "User")
relevantTechniques:
- T1546
id: 8138863e-e55f-4f02-ac94-72796e203d27
queryFrequency: 60m
status: Available
type: Microsoft.OperationalInsights/workspaces/providers/alertRules
triggerOperator: GreaterThan
version: 1.0.0
entityMappings:
- entityType: Account
fieldMappings:
- columnName: AccountName
identifier: Name
- entityType: IP
fieldMappings:
- columnName: LocalIP
identifier: Address
- entityType: Host
fieldMappings:
- columnName: DeviceName
identifier: HostName