Entities_Data_CL
| where entity_type == "account"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
version: 1.1.0
severity: High
incidentConfiguration:
groupingConfiguration:
enabled: true
groupByAlertDetails:
- DisplayName
matchingMethod: AllEntities
reopenClosedIncident: false
lookbackDuration: P7D
groupByEntities:
- Account
createIncident: true
relevantTechniques:
- T1546
triggerOperator: GreaterThan
alertDetailsOverride:
alertDescriptionFormat: An incident has been escalated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}
alertDisplayNameFormat: Vectra AI Incident- {{name}}
requiredDataConnectors:
- dataTypes:
- Entities_Data_CL
connectorId: VectraXDR
queryFrequency: 10m
triggerThreshold: 0
entityMappings:
- fieldMappings:
- columnName: name
identifier: Name
entityType: Account
eventGroupingSettings:
aggregationKind: AlertPerResult
description: Create an incident when the account entity presents a specific tag. If the tag is present, an incident should be created and marked with highest priority.
id: 87325835-dd8c-41e7-b686-fd5adbbd0aee
status: Available
suppressionEnabled: false
suppressionDuration: PT1H
name: Vectra Create Incident Based on Tag for Accounts
query: |
Entities_Data_CL
| where entity_type == "account"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
queryPeriod: 10m
tactics:
- Persistence
kind: Scheduled
customDetails:
ip_address: ip
entity_type: entity_type
attack_profile: attack_profile
entity_id: id
tags: tags
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Create_Incident_Based_On_Tag_For_Account_Entity.yaml