AlertEvidence
| where EntityType in ("Device", "User")
suppressionEnabled: false
relevantTechniques:
- T1546
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
lookbackDuration: PT5H
createIncident: false
type: Microsoft.OperationalInsights/workspaces/providers/alertRules
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
dataTypes:
- AlertEvidence
triggerThreshold: 0
version: 1.0.0
suppressionDuration: PT5H
description: This analytic rule is looking for new alert evidence from Microsoft Defender for Endpoint. The intent is to create entries in the SecurityAlert table for every new alert evidence attached to an entity of type Device or User monitored by Defender for Endpoint.
query: |
AlertEvidence
| where EntityType in ("Device", "User")
triggerOperator: GreaterThan
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Defender_Alert_Evidence.yaml
eventGroupingSettings:
aggregationKind: SingleAlert
id: 8138863e-e55f-4f02-ac94-72796e203d27
queryFrequency: 60m
entityMappings:
- fieldMappings:
- columnName: AccountName
identifier: Name
entityType: Account
- fieldMappings:
- columnName: LocalIP
identifier: Address
entityType: IP
- fieldMappings:
- columnName: DeviceName
identifier: HostName
entityType: Host
severity: High
status: Available
queryPeriod: 60m
name: Defender Alert Evidence
tactics:
- Persistence
kind: Scheduled