CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID == "ActiveProtectionBlocksSuspiciousActivity"
| summarize ActiveProtectionBlocksSuspiciousActivity = count() by DeviceName
requiredDataConnectors: []
description: Detects when three or more distinct endpoints report ransomware detections within a single day.
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleEndpointsInfectedByRansomware.yaml
query: |
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID == "ActiveProtectionBlocksSuspiciousActivity"
| summarize ActiveProtectionBlocksSuspiciousActivity = count() by DeviceName
eventGroupingSettings:
aggregationKind: SingleAlert
triggerThreshold: 2
name: Acronis - Multiple Endpoints Infected by Ransomware
relevantTechniques:
- T1486
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: true
enabled: true
matchingMethod: AnyAlert
lookbackDuration: P1D
createIncident: true
tactics:
- Impact
queryPeriod: 1d
version: 1.0.0
severity: High
entityMappings:
- entityType: Host
fieldMappings:
- columnName: DeviceName
identifier: HostName
queryFrequency: 1h
id: a783ade7-bf43-416d-b809-8f5b06d87790
kind: Scheduled
customDetails:
DeviceName: DeviceName
triggerOperator: gt