Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Defender Alert Evidence

Back
Id8138863e-e55f-4f02-ac94-72796e203d27
RulenameDefender Alert Evidence
DescriptionThis analytic rule is looking for new alert evidence from Microsoft Defender for Endpoint. The intent is to create entries in the SecurityAlert table for every new alert evidence attached to an entity of type Device or User monitored by Defender for Endpoint.
SeverityHigh
TacticsPersistence
TechniquesT1546
Required data connectorsMicrosoftThreatProtection
KindScheduled
Query frequency60m
Query period60m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Defender_Alert_Evidence.yaml
Version1.0.0
Arm template8138863e-e55f-4f02-ac94-72796e203d27.json
Deploy To Azure
AlertEvidence
| where EntityType in ("Device", "User")
suppressionEnabled: false
relevantTechniques:
- T1546
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
    lookbackDuration: PT5H
  createIncident: false
type: Microsoft.OperationalInsights/workspaces/providers/alertRules
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - AlertEvidence
triggerThreshold: 0
version: 1.0.0
suppressionDuration: PT5H
description: This analytic rule is looking for new alert evidence from Microsoft Defender for Endpoint. The intent is to create entries in the SecurityAlert table for every new alert evidence attached to an entity of type Device or User monitored by Defender for Endpoint.
query: |
  AlertEvidence
  | where EntityType in ("Device", "User")  
triggerOperator: GreaterThan
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Defender_Alert_Evidence.yaml
eventGroupingSettings:
  aggregationKind: SingleAlert
id: 8138863e-e55f-4f02-ac94-72796e203d27
queryFrequency: 60m
entityMappings:
- fieldMappings:
  - columnName: AccountName
    identifier: Name
  entityType: Account
- fieldMappings:
  - columnName: LocalIP
    identifier: Address
  entityType: IP
- fieldMappings:
  - columnName: DeviceName
    identifier: HostName
  entityType: Host
severity: High
status: Available
queryPeriod: 60m
name: Defender Alert Evidence
tactics:
- Persistence
kind: Scheduled