Entities_Data_CL
| where entity_type == "host" and is_prioritized == true
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
customDetails:
tags: tags
ip_address: ip
entity_type: entity_type
entity_id: id
attack_profile: attack_profile
requiredDataConnectors:
- dataTypes:
- Entities_Data_CL
connectorId: VectraXDR
query: |
Entities_Data_CL
| where entity_type == "host" and is_prioritized == true
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
triggerOperator: GreaterThan
suppressionEnabled: false
severity: Medium
queryPeriod: 10m
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Priority_Host.yaml
name: Vectra Create Incident Based on Priority for Hosts
alertDetailsOverride:
alertDisplayNameFormat: Vectra AI Incident- {{name}}
alertDynamicProperties:
- alertProperty: AlertLink
value: url
alertDescriptionFormat: An incident has been generated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}.
tactics:
- Persistence
version: 1.1.1
suppressionDuration: PT1H
status: Available
queryFrequency: 10m
id: 9b51b0fb-0419-4450-9ea0-0a48751c4902
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: name
kind: Scheduled
relevantTechniques:
- T1546
triggerThreshold: 0
description: Create an incident when an identity is suspected to be compromised. Vectra is using AI to prioritize an entity based on multiple factors (attack rating, velocity, breadth, importance.etc.). This layer of aggregation at the entity level provides a greater signal-to-noise ratio and help analyst focus on what matters.
incidentConfiguration:
groupingConfiguration:
lookbackDuration: P7D
reopenClosedIncident: true
matchingMethod: AllEntities
enabled: true
createIncident: true
eventGroupingSettings:
aggregationKind: AlertPerResult