Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Vectra Create Incident Based on Tag for Hosts

Back
Id8b7a1a64-8ef2-4000-b8c9-9bca3b93aace
RulenameVectra Create Incident Based on Tag for Hosts
DescriptionCreate an incident when the host entity presents a specific tag. If the tag is present, an incident should be created and marked with highest priority.
SeverityHigh
TacticsPersistence
TechniquesT1546
Required data connectorsVectraXDR
KindScheduled
Query frequency10m
Query period10m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Create_Incident_Based_On_Tag_For_Host_Entity.yaml
Version1.1.0
Arm template8b7a1a64-8ef2-4000-b8c9-9bca3b93aace.json
Deploy To Azure
Entities_Data_CL
| where entity_type == "host"
| extend Tags = todynamic(tags)
| where set_has_element(Tags, "MDR - Customer Escalation")
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
description: Create an incident when the host entity presents a specific tag. If the tag is present, an incident should be created and marked with highest priority.
entityMappings:
- fieldMappings:
  - columnName: name
    identifier: HostName
  entityType: Host
kind: Scheduled
tactics:
- Persistence
severity: High
triggerThreshold: 0
customDetails:
  ip_address: ip
  attack_profile: attack_profile
  entity_type: entity_type
  entity_id: id
  tags: tags
queryFrequency: 10m
status: Available
queryPeriod: 10m
relevantTechniques:
- T1546
eventGroupingSettings:
  aggregationKind: AlertPerResult
id: 8b7a1a64-8ef2-4000-b8c9-9bca3b93aace
name: Vectra Create Incident Based on Tag for Hosts
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    reopenClosedIncident: false
    enabled: true
    matchingMethod: AllEntities
    groupByAlertDetails:
    - DisplayName
    groupByEntities:
    - Host
    lookbackDuration: P7D
query: |
  Entities_Data_CL
  | where entity_type == "host"
  | extend Tags = todynamic(tags)
  | where set_has_element(Tags, "MDR - Customer Escalation")
  | summarize arg_max(['last_modified_timestamp'], *) by ['name']  
triggerOperator: GreaterThan
suppressionEnabled: false
suppressionDuration: PT1H
version: 1.1.0
alertDetailsOverride:
  alertDescriptionFormat: An incident has been escalated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}
  alertDisplayNameFormat: Vectra AI Incident- {{name}}
  alertDynamicProperties:
  - value: url
    alertProperty: AlertLink
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Create_Incident_Based_On_Tag_For_Host_Entity.yaml
requiredDataConnectors:
- dataTypes:
  - Entities_Data_CL
  connectorId: VectraXDR