Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Removable storage ONLINE event from secRMM

Back
IdA22B2ECF-1478-4400-877E-07A32E53A897
RulenameRemovable storage ONLINE event from secRMM
DescriptionDetect when a removable storage device is plugged in by the end-user.
SeverityHigh
TacticsCollection
TechniquesT1025
KindNRT
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Squadra Technologies SecRmm/Analytic Rules/Removable_Storage_ONLINE.yaml
Arm templateA22B2ECF-1478-4400-877E-07A32E53A897.json
Deploy To Azure
secRMM_CL | where Event_s == "ONLINE" | 
extend AccountCustomEntity = User_s |
extend HostCustomEntity = Computer
suppressionEnabled: false
description: Detect when a removable storage device is plugged in by the end-user.
displayName: Removable Storage ONLINE
tactics:
- Collection
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Squadra Technologies SecRmm/Analytic Rules/Removable_Storage_ONLINE.yaml
createIncident: true
severity: High
name: Removable storage ONLINE event from secRMM
suppressionDuration: PT5H
customDetails: 
alertDetailsOverride: 
groupingConfiguration:
  enabled: false
  groupByEntities: []
  reopenClosedIncident: false
  lookbackDuration: PT5H
  matchingMethod: AllEntities
  groupByCustomDetails: []
  groupByAlertDetails: []
query: |
  secRMM_CL | where Event_s == "ONLINE" | 
  extend AccountCustomEntity = User_s |
  extend HostCustomEntity = Computer  
relevantTechniques:
- T1025
alertRuleTemplateName: 
id: A22B2ECF-1478-4400-877E-07A32E53A897
enabled: true
entityMappings:
- entityType: Account
  fieldMappings:
  - columnName: User_s
    identifier: AadUserId
- entityType: Host
  fieldMappings:
  - columnName: Computer
    identifier: HostName
apiVersion: 2025-09-01
incidentConfiguration: 
eventGroupingSettings: 
kind: NRT
aggregationKind: AlertPerResult
subTechniques: []