Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Vectra Create Incident Based on Priority for Hosts

Back
Id9b51b0fb-0419-4450-9ea0-0a48751c4902
RulenameVectra Create Incident Based on Priority for Hosts
DescriptionCreate an incident when an identity is suspected to be compromised. Vectra is using AI to prioritize an entity based on multiple factors (attack rating, velocity, breadth, importance.etc.). This layer of aggregation at the entity level provides a greater signal-to-noise ratio and help analyst focus on what matters.
SeverityMedium
TacticsPersistence
TechniquesT1546
Required data connectorsVectraXDR
KindScheduled
Query frequency10m
Query period10m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Priority_Host.yaml
Version1.1.1
Arm template9b51b0fb-0419-4450-9ea0-0a48751c4902.json
Deploy To Azure
Entities_Data_CL
| where entity_type == "host" and is_prioritized == true
| summarize arg_max(['last_modified_timestamp'], *) by ['name']
customDetails:
  ip_address: ip
  tags: tags
  entity_id: id
  entity_type: entity_type
  attack_profile: attack_profile
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Priority_Host.yaml
triggerOperator: GreaterThan
suppressionDuration: PT1H
requiredDataConnectors:
- dataTypes:
  - Entities_Data_CL
  connectorId: VectraXDR
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: true
    enabled: true
    matchingMethod: AllEntities
    lookbackDuration: P7D
  createIncident: true
relevantTechniques:
- T1546
kind: Scheduled
name: Vectra Create Incident Based on Priority for Hosts
query: |
  Entities_Data_CL
  | where entity_type == "host" and is_prioritized == true
  | summarize arg_max(['last_modified_timestamp'], *) by ['name']  
tactics:
- Persistence
severity: Medium
suppressionEnabled: false
entityMappings:
- fieldMappings:
  - identifier: HostName
    columnName: name
  entityType: Host
queryFrequency: 10m
description: Create an incident when an identity is suspected to be compromised. Vectra is using AI to prioritize an entity based on multiple factors (attack rating, velocity, breadth, importance.etc.). This layer of aggregation at the entity level provides a greater signal-to-noise ratio and help analyst focus on what matters.
alertDetailsOverride:
  alertDisplayNameFormat: Vectra AI Incident- {{name}}
  alertDescriptionFormat: An incident has been generated for Vectra AI entity {{name}} that is presenting an urgency score of {{urgency_score}}.
  alertDynamicProperties:
  - value: url
    alertProperty: AlertLink
triggerThreshold: 0
queryPeriod: 10m
version: 1.1.1
eventGroupingSettings:
  aggregationKind: AlertPerResult
id: 9b51b0fb-0419-4450-9ea0-0a48751c4902