Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Postman API Exposure Detection

Back
Id99ca8956-5aad-4542-9fbc-8254182b424d
RulenameCyble Vision Alerts Postman API Exposure Detection
DescriptionDetects exposed Postman requests, collections or endpoints referencing monitored entities. Alerts analysts to possible API enumeration, leaked endpoints, or unintended exposure.
SeverityLow
TacticsReconnaissance
CredentialAccess
Exfiltration
TechniquesT1595
T1552
T1041
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Postman.yaml
Version1.0.0
Arm template99ca8956-5aad-4542-9fbc-8254182b424d.json
Deploy To Azure
Alerts_postman  
| where Service == "postman"
| extend MappedSeverity = Severity
customDetails:
  PM_DevelopedBy: PM_DevelopedBy
  PM_DevelopedByUrl: PM_DevelopedByUrl
  PM_Title: PM_Title
  PM_Category: PM_Category
  PM_Url: PM_Url
  MappedSeverity: Severity
  AlertID: AlertID
  PM_PostmanKey: PM_PostmanKey
  Service: Service
  Status: Status
id: 99ca8956-5aad-4542-9fbc-8254182b424d
name: Cyble Vision Alerts Postman API Exposure Detection
queryPeriod: 30m
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
incidentConfiguration:
  createIncident: true
  alertDetailsOverride: 
  alertDescriptionFormat: |
        A Postman API request referencing monitored entity {{KeywordName}} was discovered. Public Workspace {{PM_IsPublic}}. Developer {{PM_DevelopedBy}}. This may indicate exposed API endpoints, leaked request parameters or sensitive testing data.
  alertDisplayNameFormat: Exposed Postman API Request {{PM_Title}}
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
    reopenClosedIncident: false
version: 1.0.0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Postman.yaml
query: |
  Alerts_postman  
  | where Service == "postman"
  | extend MappedSeverity = Severity  
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1595
- T1552
- T1041
entityMappings:
- entityType: Url
  fieldMappings:
  - identifier: Url
    columnName: PM_Url
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: KeywordName
enabled: true
severity: Low
kind: Scheduled
triggerThreshold: 0
triggerOperator: GreaterThan
tactics:
- Reconnaissance
- CredentialAccess
- Exfiltration
status: Available
queryfrequency: 30m
description: |
    'Detects exposed Postman requests, collections or endpoints referencing monitored entities. Alerts analysts to possible API enumeration, leaked endpoints, or unintended exposure.'