AlertEvidence
| where EntityType in ("Device", "User")
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Defender_Alert_Evidence.yaml
suppressionEnabled: false
queryFrequency: 60m
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: AccountName
- entityType: IP
fieldMappings:
- identifier: Address
columnName: LocalIP
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: DeviceName
status: Available
suppressionDuration: PT5H
type: Microsoft.OperationalInsights/workspaces/providers/alertRules
id: 8138863e-e55f-4f02-ac94-72796e203d27
query: |
AlertEvidence
| where EntityType in ("Device", "User")
queryPeriod: 60m
version: 1.0.0
eventGroupingSettings:
aggregationKind: SingleAlert
severity: High
kind: Scheduled
triggerOperator: GreaterThan
incidentConfiguration:
createIncident: false
groupingConfiguration:
enabled: false
reopenClosedIncident: false
lookbackDuration: PT5H
matchingMethod: AllEntities
name: Defender Alert Evidence
description: This analytic rule is looking for new alert evidence from Microsoft Defender for Endpoint. The intent is to create entries in the SecurityAlert table for every new alert evidence attached to an entity of type Device or User monitored by Defender for Endpoint.
relevantTechniques:
- T1546
requiredDataConnectors:
- dataTypes:
- AlertEvidence
connectorId: MicrosoftThreatProtection
tactics:
- Persistence