CommonSecurityLog
| where DeviceVendor == "Acronis audit"
| extend initiator_ip = tostring(parse_json(DeviceCustomString1).initiator_ip)
| summarize LoginCount = count() by initiator_ip
| where LoginCount <= 2
| order by LoginCount asc
triggerOperator: gt
incidentConfiguration:
groupingConfiguration:
lookbackDuration: P7D
enabled: true
reopenClosedIncident: true
matchingMethod: Selected
groupByEntities:
- IP
createIncident: true
requiredDataConnectors: []
relevantTechniques:
- T1078
entityMappings:
- entityType: IP
fieldMappings:
- identifier: Address
columnName: initiator_ip
query: |
CommonSecurityLog
| where DeviceVendor == "Acronis audit"
| extend initiator_ip = tostring(parse_json(DeviceCustomString1).initiator_ip)
| summarize LoginCount = count() by initiator_ip
| where LoginCount <= 2
| order by LoginCount asc
triggerThreshold: 0
alertDetailsOverride:
alertDynamicProperties: []
alertDisplayNameFormat: Acronis - Login from Abnormal IP ({{initiator_ip}}) - Low Occurrence ({{LoginCount}})
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisLoginFromAbnormalIPLowOccurrence.yaml
queryPeriod: 14d
tactics:
- InitialAccess
name: Acronis - Login from Abnormal IP - Low Occurrence
kind: Scheduled
description: Suspicious login from an IP address observed up to two times in the last two weeks.
id: 84037130-a623-46c2-9144-0c0955ac4112
version: 1.0.0
eventGroupingSettings:
aggregationKind: AlertPerResult
queryFrequency: 1d
severity: Medium