Entities_Data_CL
| where entity_type == "host" and is_prioritized == true
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
queryFrequency: 10m
entityMappings:
- entityType: Host
fieldMappings:
- columnName: name
identifier: HostName
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.1.1
id: 9b51b0fb-0419-4450-9ea0-0a48751c4902
suppressionEnabled: false
severity: Medium
kind: Scheduled
suppressionDuration: PT1H
description: Create an incident when an identity is suspected to be compromised. Vectra is using AI to prioritize an entity based on multiple factors (attack rating, velocity, breadth, importance.etc.). This layer of aggregation at the entity level provides a greater signal-to-noise ratio and help analyst focus on what matters.
relevantTechniques:
- T1546
requiredDataConnectors:
- connectorId: VectraXDR
dataTypes:
- Entities_Data_CL
triggerOperator: GreaterThan
name: Vectra Create Incident Based on Priority for Hosts
tactics:
- Persistence
alertDetailsOverride:
alertDescriptionFormat: An incident has been generated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}.
alertDynamicProperties:
- value: url
alertProperty: AlertLink
alertDisplayNameFormat: Vectra AI Incident- {{name}}
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Priority_Host.yaml
triggerThreshold: 0
queryPeriod: 10m
query: |
Entities_Data_CL
| where entity_type == "host" and is_prioritized == true
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
status: Available
customDetails:
entity_id: id
tags: tags
entity_type: entity_type
ip_address: ip
attack_profile: attack_profile
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: P7D
enabled: true
reopenClosedIncident: true
matchingMethod: AllEntities