Entities_Data_CL
| where entity_type == "host" and is_prioritized == true
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
relevantTechniques:
- T1546
queryPeriod: 10m
requiredDataConnectors:
- dataTypes:
- Entities_Data_CL
connectorId: VectraXDR
kind: Scheduled
eventGroupingSettings:
aggregationKind: AlertPerResult
alertDetailsOverride:
alertDynamicProperties:
- value: url
alertProperty: AlertLink
alertDescriptionFormat: An incident has been generated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}.
alertDisplayNameFormat: Vectra AI Incident- {{name}}
suppressionEnabled: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Priority_Host.yaml
triggerThreshold: 0
version: 1.1.1
id: 9b51b0fb-0419-4450-9ea0-0a48751c4902
severity: Medium
name: Vectra Create Incident Based on Priority for Hosts
status: Available
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: name
queryFrequency: 10m
triggerOperator: GreaterThan
query: |
Entities_Data_CL
| where entity_type == "host" and is_prioritized == true
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
incidentConfiguration:
createIncident: true
groupingConfiguration:
reopenClosedIncident: true
enabled: true
lookbackDuration: P7D
matchingMethod: AllEntities
description: Create an incident when an identity is suspected to be compromised. Vectra is using AI to prioritize an entity based on multiple factors (attack rating, velocity, breadth, importance.etc.). This layer of aggregation at the entity level provides a greater signal-to-noise ratio and help analyst focus on what matters.
suppressionDuration: PT1H
tactics:
- Persistence
customDetails:
tags: tags
attack_profile: attack_profile
ip_address: ip
entity_id: id
entity_type: entity_type