Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Postman API Exposure Detection

Back
Id99ca8956-5aad-4542-9fbc-8254182b424d
RulenameCyble Vision Alerts Postman API Exposure Detection
DescriptionDetects exposed Postman requests, collections or endpoints referencing monitored entities. Alerts analysts to possible API enumeration, leaked endpoints, or unintended exposure.
SeverityLow
TacticsReconnaissance
CredentialAccess
Exfiltration
TechniquesT1595
T1552
T1041
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Postman.yaml
Version1.0.0
Arm template99ca8956-5aad-4542-9fbc-8254182b424d.json
Deploy To Azure
Alerts_postman  
| where Service == "postman"
| extend MappedSeverity = Severity
relevantTechniques:
- T1595
- T1552
- T1041
entityMappings:
- entityType: Url
  fieldMappings:
  - columnName: PM_Url
    identifier: Url
- entityType: Host
  fieldMappings:
  - columnName: KeywordName
    identifier: HostName
version: 1.0.0
query: |
  Alerts_postman  
  | where Service == "postman"
  | extend MappedSeverity = Severity  
id: 99ca8956-5aad-4542-9fbc-8254182b424d
triggerOperator: GreaterThan
severity: Low
kind: Scheduled
queryfrequency: 30m
description: |
    'Detects exposed Postman requests, collections or endpoints referencing monitored entities. Alerts analysts to possible API enumeration, leaked endpoints, or unintended exposure.'
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
eventGroupingSettings:
  aggregationKind: AlertPerResult
name: Cyble Vision Alerts Postman API Exposure Detection
tactics:
- Reconnaissance
- CredentialAccess
- Exfiltration
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Postman.yaml
triggerThreshold: 0
queryPeriod: 30m
enabled: true
status: Available
customDetails:
  PM_Category: PM_Category
  PM_PostmanKey: PM_PostmanKey
  PM_Url: PM_Url
  Status: Status
  PM_DevelopedByUrl: PM_DevelopedByUrl
  Service: Service
  PM_DevelopedBy: PM_DevelopedBy
  MappedSeverity: Severity
  AlertID: AlertID
  PM_Title: PM_Title
incidentConfiguration:
  alertDisplayNameFormat: Exposed Postman API Request {{PM_Title}}
  alertDetailsOverride: 
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities
  alertDescriptionFormat: |
        A Postman API request referencing monitored entity {{KeywordName}} was discovered. Public Workspace {{PM_IsPublic}}. Developer {{PM_DevelopedBy}}. This may indicate exposed API endpoints, leaked request parameters or sensitive testing data.