AlertEvidence
| where EntityType in ("Device", "User")
eventGroupingSettings:
aggregationKind: SingleAlert
triggerThreshold: 0
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: AccountName
- entityType: IP
fieldMappings:
- identifier: Address
columnName: LocalIP
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: DeviceName
requiredDataConnectors:
- dataTypes:
- AlertEvidence
connectorId: MicrosoftThreatProtection
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Defender_Alert_Evidence.yaml
suppressionEnabled: false
incidentConfiguration:
createIncident: false
groupingConfiguration:
enabled: false
reopenClosedIncident: false
matchingMethod: AllEntities
lookbackDuration: PT5H
queryPeriod: 60m
relevantTechniques:
- T1546
status: Available
version: 1.0.0
severity: High
type: Microsoft.OperationalInsights/workspaces/providers/alertRules
kind: Scheduled
id: 8138863e-e55f-4f02-ac94-72796e203d27
query: |
AlertEvidence
| where EntityType in ("Device", "User")
description: This analytic rule is looking for new alert evidence from Microsoft Defender for Endpoint. The intent is to create entries in the SecurityAlert table for every new alert evidence attached to an entity of type Device or User monitored by Defender for Endpoint.
queryFrequency: 60m
name: Defender Alert Evidence
triggerOperator: GreaterThan
tactics:
- Persistence
suppressionDuration: PT5H