Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

OCI - Unexpected user agent

Back
Ida0b9a7ca-3e6d-4996-ae35-759df1d67a54
RulenameOCI - Unexpected user agent
DescriptionDetects unexpected user agent strings.
SeverityMedium
TacticsInitialAccess
TechniquesT1190
Required data connectorsOracleCloudInfrastructureLogsConnector
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Oracle Cloud Infrastructure/Analytic Rules/OCIUnexpectedUserAgent.yaml
Version1.0.0
Arm templatea0b9a7ca-3e6d-4996-ae35-759df1d67a54.json
Deploy To Azure
OCILogs
| where isnotempty(HttpUserAgentOriginal)
| where strlen(HttpUserAgentOriginal) <= 10
| extend IPCustomEntity = SrcIpAddr
severity: Medium
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Oracle Cloud Infrastructure/Analytic Rules/OCIUnexpectedUserAgent.yaml
id: a0b9a7ca-3e6d-4996-ae35-759df1d67a54
entityMappings:
- fieldMappings:
  - identifier: Address
    columnName: IPCustomEntity
  entityType: IP
kind: Scheduled
status: Available
tactics:
- InitialAccess
queryFrequency: 1h
requiredDataConnectors:
- connectorId: OracleCloudInfrastructureLogsConnector
  dataTypes:
  - OCILogs
relevantTechniques:
- T1190
version: 1.0.0
description: |
    'Detects unexpected user agent strings.'
triggerThreshold: 0
query: |
  OCILogs
  | where isnotempty(HttpUserAgentOriginal)
  | where strlen(HttpUserAgentOriginal) <= 10
  | extend IPCustomEntity = SrcIpAddr  
queryPeriod: 1h
name: OCI - Unexpected user agent