SecurityBridgeLogs
| where Severity contains "Critical"
requiredDataConnectors:
- datatypes:
- SecurityBridgeLogs_CL
connectorId: CustomLogsAma
relevantTechniques:
- T1189
triggerOperator: gt
version: 1.0.4
queryFrequency: 5m
severity: Medium
triggerThreshold: 0
entityMappings:
- fieldMappings:
- columnName: maincontact
identifier: Name
entityType: Account
- fieldMappings:
- columnName: dhost
identifier: HostName
entityType: Host
- fieldMappings:
- columnName: dvchost
identifier: HostName
entityType: Host
name: 'SecurityBridge: A critical event occured'
query: |
SecurityBridgeLogs
| where Severity contains "Critical"
tactics:
- InitialAccess
queryPeriod: 5m
description: |
'This rule alerts if there is any critical event occured in the SAP system'
kind: Scheduled
id: 8c5c766a-ce9b-4112-b6ed-1b8fe33733b7
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SecurityBridge App/Analytical Rules/CriticalEventTriggered.yaml
status: Available