SecurityBridgeLogs
| where Severity contains "Critical"
relevantTechniques:
- T1189
entityMappings:
- entityType: Account
fieldMappings:
- columnName: maincontact
identifier: Name
- entityType: Host
fieldMappings:
- columnName: dhost
identifier: HostName
- entityType: Host
fieldMappings:
- columnName: dvchost
identifier: HostName
version: 1.0.4
id: 8c5c766a-ce9b-4112-b6ed-1b8fe33733b7
severity: Medium
kind: Scheduled
queryFrequency: 5m
description: |
'This rule alerts if there is any critical event occured in the SAP system'
requiredDataConnectors:
- connectorId: CustomLogsAma
datatypes:
- SecurityBridgeLogs_CL
triggerOperator: gt
name: 'SecurityBridge: A critical event occured'
tactics:
- InitialAccess
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SecurityBridge App/Analytical Rules/CriticalEventTriggered.yaml
triggerThreshold: 0
queryPeriod: 5m
query: |
SecurityBridgeLogs
| where Severity contains "Critical"
status: Available