let threshold = 5;
VersasecCmsSysLogs
| where EventId == 2
| sort by ComputerName asc, TimeGenerated asc
| extend TimeDiff = datetime_diff('minute', TimeGenerated, prev(TimeGenerated))
| where TimeDiff <= threshold and ComputerName == prev(ComputerName)
name: Versasec CMS - Multiple Failed Login Attempts
incidentConfiguration:
groupingConfiguration:
enabled: false
reopenClosedIncident: false
lookbackDuration: 5m
matchingMethod: AllEntities
createIncident: true
query: |
let threshold = 5;
VersasecCmsSysLogs
| where EventId == 2
| sort by ComputerName asc, TimeGenerated asc
| extend TimeDiff = datetime_diff('minute', TimeGenerated, prev(TimeGenerated))
| where TimeDiff <= threshold and ComputerName == prev(ComputerName)
entityMappings:
- entityType: Host
fieldMappings:
- columnName: ComputerName
identifier: FullName
queryPeriod: 1h
version: 1.0.1
tactics:
- CredentialAccess
triggerOperator: gt
kind: Scheduled
triggerThreshold: 5
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VersasecCMS/Analytic Rules/VersasecCmsOperatorLoginFailed.yaml
eventGroupingSettings:
aggregationKind: SingleAlert
relevantTechniques:
- T1110
id: B1DB8B7E-9D74-48C3-9683-74483CBEFF4E
severity: High
requiredDataConnectors:
- connectorId: VersasecCms
dataTypes:
- VersasecCmsSysLogs
status: Available
description: |
Detects when Operator login failed to often.
queryFrequency: 5m