Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Vectra Create Incident Based on Tag for Accounts

Back
Id87325835-dd8c-41e7-b686-fd5adbbd0aee
RulenameVectra Create Incident Based on Tag for Accounts
DescriptionCreate an incident when the account entity presents a specific tag. If the tag is present, an incident should be created and marked with highest priority.
SeverityHigh
TacticsPersistence
TechniquesT1546
Required data connectorsVectraXDR
KindScheduled
Query frequency10m
Query period10m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Create_Incident_Based_On_Tag_For_Account_Entity.yaml
Version1.1.0
Arm template87325835-dd8c-41e7-b686-fd5adbbd0aee.json
Deploy To Azure
Entities_Data_CL
| where entity_type == "account"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Create_Incident_Based_On_Tag_For_Account_Entity.yaml
queryPeriod: 10m
description: Create an incident when the account entity presents a specific tag. If the tag is present, an incident should be created and marked with highest priority.
suppressionEnabled: false
name: Vectra Create Incident Based on Tag for Accounts
triggerOperator: GreaterThan
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: name
kind: Scheduled
requiredDataConnectors:
- connectorId: VectraXDR
  dataTypes:
  - Entities_Data_CL
customDetails:
  attack_profile: attack_profile
  tags: tags
  entity_type: entity_type
  ip_address: ip
  entity_id: id
triggerThreshold: 0
eventGroupingSettings:
  aggregationKind: AlertPerResult
suppressionDuration: PT1H
queryFrequency: 10m
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: P7D
    matchingMethod: AllEntities
    enabled: true
    groupByEntities:
    - Account
    reopenClosedIncident: false
    groupByAlertDetails:
    - DisplayName
tactics:
- Persistence
id: 87325835-dd8c-41e7-b686-fd5adbbd0aee
status: Available
version: 1.1.0
query: |
  Entities_Data_CL
  | where entity_type == "account"
  | extend Tags = todynamic(tags)
  | where set_has_element(Tags, "MDR - Customer Escalation")
  | summarize arg_max(['last_modified_timestamp'], *) by ['name']  
alertDetailsOverride:
  alertDescriptionFormat: An incident has been escalated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}
  alertDisplayNameFormat: Vectra AI Incident- {{name}}
severity: High
relevantTechniques:
- T1546