SecurityBridgeLogs
| where Severity contains "Critical"
description: |
'This rule alerts if there is any critical event occured in the SAP system'
version: 1.0.4
triggerThreshold: 0
tactics:
- InitialAccess
queryPeriod: 5m
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SecurityBridge App/Analytical Rules/CriticalEventTriggered.yaml
triggerOperator: gt
status: Available
id: 8c5c766a-ce9b-4112-b6ed-1b8fe33733b7
name: 'SecurityBridge: A critical event occured'
queryFrequency: 5m
severity: Medium
kind: Scheduled
entityMappings:
- fieldMappings:
- columnName: maincontact
identifier: Name
entityType: Account
- fieldMappings:
- columnName: dhost
identifier: HostName
entityType: Host
- fieldMappings:
- columnName: dvchost
identifier: HostName
entityType: Host
relevantTechniques:
- T1189
query: |
SecurityBridgeLogs
| where Severity contains "Critical"
requiredDataConnectors:
- datatypes:
- SecurityBridgeLogs_CL
connectorId: CustomLogsAma