Entities_Data_CL
| where entity_type == "host"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
alertDetailsOverride:
alertDescriptionFormat: An incident has been escalated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}
alertDynamicProperties:
- alertProperty: AlertLink
value: url
alertDisplayNameFormat: Vectra AI Incident- {{name}}
relevantTechniques:
- T1546
name: Vectra Create Incident Based on Tag for Hosts
queryFrequency: 10m
tactics:
- Persistence
triggerThreshold: 0
severity: High
requiredDataConnectors:
- connectorId: VectraXDR
dataTypes:
- Entities_Data_CL
suppressionDuration: PT1H
query: |
Entities_Data_CL
| where entity_type == "host"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.1.0
kind: Scheduled
entityMappings:
- fieldMappings:
- columnName: name
identifier: HostName
entityType: Host
queryPeriod: 10m
triggerOperator: GreaterThan
customDetails:
ip_address: ip
tags: tags
attack_profile: attack_profile
entity_id: id
entity_type: entity_type
suppressionEnabled: false
incidentConfiguration:
groupingConfiguration:
groupByEntities:
- Host
matchingMethod: AllEntities
enabled: true
lookbackDuration: P7D
groupByAlertDetails:
- DisplayName
reopenClosedIncident: false
createIncident: true
id: 8b7a1a64-8ef2-4000-b8c9-9bca3b93aace
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Create_Incident_Based_On_Tag_For_Host_Entity.yaml
status: Available
description: Create an incident when the host entity presents a specific tag. If the tag is present, an incident should be created and marked with highest priority.