CommonSecurityLog
| where DeviceVendor == "Acronis audit"
| extend initiator_ip = tostring(parse_json(DeviceCustomString1).initiator_ip)
| summarize LoginCount = count() by initiator_ip
| where LoginCount <= 2
| order by LoginCount asc
eventGroupingSettings:
aggregationKind: AlertPerResult
triggerThreshold: 0
entityMappings:
- entityType: IP
fieldMappings:
- identifier: Address
columnName: initiator_ip
requiredDataConnectors: []
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisLoginFromAbnormalIPLowOccurrence.yaml
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: P7D
reopenClosedIncident: true
enabled: true
groupByEntities:
- IP
matchingMethod: Selected
name: Acronis - Login from Abnormal IP - Low Occurrence
alertDetailsOverride:
alertDisplayNameFormat: Acronis - Login from Abnormal IP ({{initiator_ip}}) - Low Occurrence ({{LoginCount}})
alertDynamicProperties: []
relevantTechniques:
- T1078
query: |
CommonSecurityLog
| where DeviceVendor == "Acronis audit"
| extend initiator_ip = tostring(parse_json(DeviceCustomString1).initiator_ip)
| summarize LoginCount = count() by initiator_ip
| where LoginCount <= 2
| order by LoginCount asc
version: 1.0.0
queryPeriod: 14d
kind: Scheduled
id: 84037130-a623-46c2-9144-0c0955ac4112
description: Suspicious login from an IP address observed up to two times in the last two weeks.
queryFrequency: 1d
severity: Medium
triggerOperator: gt
tactics:
- InitialAccess