let threshold = 5;
VersasecCmsSysLogs
| where EventId == 2
| sort by ComputerName asc, TimeGenerated asc
| extend TimeDiff = datetime_diff('minute', TimeGenerated, prev(TimeGenerated))
| where TimeDiff <= threshold and ComputerName == prev(ComputerName)
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VersasecCMS/Analytic Rules/VersasecCmsOperatorLoginFailed.yaml
query: |
let threshold = 5;
VersasecCmsSysLogs
| where EventId == 2
| sort by ComputerName asc, TimeGenerated asc
| extend TimeDiff = datetime_diff('minute', TimeGenerated, prev(TimeGenerated))
| where TimeDiff <= threshold and ComputerName == prev(ComputerName)
entityMappings:
- entityType: Host
fieldMappings:
- identifier: FullName
columnName: ComputerName
kind: Scheduled
triggerOperator: gt
requiredDataConnectors:
- dataTypes:
- VersasecCmsSysLogs
connectorId: VersasecCms
tactics:
- CredentialAccess
triggerThreshold: 5
description: |
Detects when Operator login failed to often.
queryPeriod: 1h
version: 1.0.1
queryFrequency: 5m
severity: High
incidentConfiguration:
createIncident: true
groupingConfiguration:
reopenClosedIncident: false
lookbackDuration: 5m
matchingMethod: AllEntities
enabled: false
name: Versasec CMS - Multiple Failed Login Attempts
id: B1DB8B7E-9D74-48C3-9683-74483CBEFF4E
eventGroupingSettings:
aggregationKind: SingleAlert
status: Available
relevantTechniques:
- T1110