Entities_Data_CL
| where entity_type == "host"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
query: |
Entities_Data_CL
| where entity_type == "host"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
tactics:
- Persistence
kind: Scheduled
customDetails:
tags: tags
ip_address: ip
attack_profile: attack_profile
entity_type: entity_type
entity_id: id
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Create_Incident_Based_On_Tag_For_Host_Entity.yaml
suppressionEnabled: false
triggerOperator: GreaterThan
requiredDataConnectors:
- dataTypes:
- Entities_Data_CL
connectorId: VectraXDR
description: Create an incident when the host entity presents a specific tag. If the tag is present, an incident should be created and marked with highest priority.
relevantTechniques:
- T1546
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: P7D
groupByAlertDetails:
- DisplayName
reopenClosedIncident: false
groupByEntities:
- Host
matchingMethod: AllEntities
enabled: true
version: 1.1.0
queryFrequency: 10m
name: Vectra Create Incident Based on Tag for Hosts
severity: High
suppressionDuration: PT1H
status: Available
queryPeriod: 10m
id: 8b7a1a64-8ef2-4000-b8c9-9bca3b93aace
alertDetailsOverride:
alertDynamicProperties:
- value: url
alertProperty: AlertLink
alertDescriptionFormat: An incident has been escalated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}
alertDisplayNameFormat: Vectra AI Incident- {{name}}
eventGroupingSettings:
aggregationKind: AlertPerResult
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: name