Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Physical Threat Alert

Back
Id88db8505-1889-46aa-a4e2-4e866262dcb9
RulenameCyble Vision Alerts Physical Threat Alert
DescriptionCreates an incident for physical threats identified by Cyble Intelligence such as explosions, safety incidents, riots, or violence. Each alert generates a single incident for SOC evaluation.
SeverityLow
TacticsImpact
TechniquesT1486
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Physical_Threats.yaml
Version1.0.0
Arm template88db8505-1889-46aa-a4e2-4e866262dcb9.json
Deploy To Azure
Alerts_physical_threats
| where Service == "physical_threats"
| extend MappedSeverity = Severity
name: Cyble Vision Alerts Physical Threat Alert
alertDetailsOverride:
  alertDisplayNameFormat: Physical Threat Detected  {{PT_Title_Nested}}
  alertDescriptionFormat: |
    A physical threat incident was identified by Cyble Intelligence.
    Title {{PT_Title_Nested}}
    Threat Type {{PT_ThreatType}}
    Published At {{PT_PublishedAt}}    
query: |
  Alerts_physical_threats
  | where Service == "physical_threats"
  | extend MappedSeverity = Severity  
id: 88db8505-1889-46aa-a4e2-4e866262dcb9
enabled: true
entityMappings:
- fieldMappings:
  - columnName: PT_BaseSourceURL
    identifier: Url
  entityType: URL
version: 1.0.0
triggerOperator: GreaterThan
suppressionDuration: PT5M
description: |
    'Creates an incident for physical threats identified by Cyble Intelligence such as explosions, safety incidents, riots, or violence. Each alert generates a single incident for SOC evaluation.'
kind: Scheduled
queryFrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Physical_Threats.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  Location: PT_LocationName
  AlertID: AlertID
  LocationType: PT_LocationType
  ThreatType: PT_ThreatType
  ThreatTitle: PT_Title_Nested
  Service: Service
  Longitude: PT_Longitude
  Status: Status
  Latitude: PT_Latitude
  MappedSeverity: Severity
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1486
tactics:
- Impact