AlertEvidence
| where EntityType in ("Device", "User")
eventGroupingSettings:
aggregationKind: SingleAlert
suppressionEnabled: false
incidentConfiguration:
groupingConfiguration:
enabled: false
matchingMethod: AllEntities
lookbackDuration: PT5H
reopenClosedIncident: false
createIncident: false
suppressionDuration: PT5H
tactics:
- Persistence
name: Defender Alert Evidence
status: Available
entityMappings:
- fieldMappings:
- columnName: AccountName
identifier: Name
entityType: Account
- fieldMappings:
- columnName: LocalIP
identifier: Address
entityType: IP
- fieldMappings:
- columnName: DeviceName
identifier: HostName
entityType: Host
queryPeriod: 60m
version: 1.0.0
description: This analytic rule is looking for new alert evidence from Microsoft Defender for Endpoint. The intent is to create entries in the SecurityAlert table for every new alert evidence attached to an entity of type Device or User monitored by Defender for Endpoint.
severity: High
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Defender_Alert_Evidence.yaml
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
dataTypes:
- AlertEvidence
queryFrequency: 60m
id: 8138863e-e55f-4f02-ac94-72796e203d27
type: Microsoft.OperationalInsights/workspaces/providers/alertRules
triggerThreshold: 0
query: |
AlertEvidence
| where EntityType in ("Device", "User")
relevantTechniques:
- T1546
kind: Scheduled
triggerOperator: GreaterThan