Entities_Data_CL
| where entity_type == "account"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
version: 1.1.0
queryPeriod: 10m
customDetails:
ip_address: ip
tags: tags
entity_type: entity_type
attack_profile: attack_profile
entity_id: id
suppressionDuration: PT1H
id: 87325835-dd8c-41e7-b686-fd5adbbd0aee
status: Available
severity: High
relevantTechniques:
- T1546
requiredDataConnectors:
- connectorId: VectraXDR
dataTypes:
- Entities_Data_CL
suppressionEnabled: false
triggerThreshold: 0
queryFrequency: 10m
name: Vectra Create Incident Based on Tag for Accounts
kind: Scheduled
description: Create an incident when the account entity presents a specific tag. If the tag is present, an incident should be created and marked with highest priority.
triggerOperator: GreaterThan
tactics:
- Persistence
alertDetailsOverride:
alertDisplayNameFormat: Vectra AI Incident- {{name}}
alertDescriptionFormat: An incident has been escalated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}
eventGroupingSettings:
aggregationKind: AlertPerResult
entityMappings:
- fieldMappings:
- columnName: name
identifier: Name
entityType: Account
query: |
Entities_Data_CL
| where entity_type == "account"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Create_Incident_Based_On_Tag_For_Account_Entity.yaml
incidentConfiguration:
groupingConfiguration:
enabled: true
groupByAlertDetails:
- DisplayName
groupByEntities:
- Account
matchingMethod: AllEntities
reopenClosedIncident: false
lookbackDuration: P7D
createIncident: true