SecurityBridgeLogs
| where Severity contains "Critical"
triggerOperator: gt
queryFrequency: 5m
requiredDataConnectors:
- connectorId: CustomLogsAma
datatypes:
- SecurityBridgeLogs_CL
relevantTechniques:
- T1189
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: maincontact
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: dhost
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: dvchost
query: |
SecurityBridgeLogs
| where Severity contains "Critical"
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SecurityBridge App/Analytical Rules/CriticalEventTriggered.yaml
queryPeriod: 5m
name: 'SecurityBridge: A critical event occured'
status: Available
kind: Scheduled
description: |
'This rule alerts if there is any critical event occured in the SAP system'
id: 8c5c766a-ce9b-4112-b6ed-1b8fe33733b7
version: 1.0.4
tactics:
- InitialAccess
severity: Medium