VMware_VECO_EventLogs_CL
| where event == "EDGE_CONGESTED"
| where message contains "high number of packet drops"
| extend edgeSerialNumber = extract("edgeSerialNumber: (.+)$", 1, detail)
eventGroupingSettings:
aggregationKind: SingleAlert
requiredDataConnectors:
- connectorId: VMwareSDWAN
dataTypes:
- SDWAN
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sdwan-device-congestion.yaml
triggerThreshold: 0
description: The VMware Edge Cloud Orchestrator reported an edge congestion event, where the Edge is dropping a large number of packets on one of its interfaces. This could indicate an ongoing Denial of Service attack against an appliance. Please make sure that Network Flood Protection is turned on.
relevantTechniques:
- T1498
queryPeriod: 1h
name: VMware SD-WAN Edge - Device Congestion Alert - Packet Drops
suppressionEnabled: false
suppressionDuration: 5h
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: true
lookbackDuration: 5h
groupByEntities: []
groupByCustomDetails: []
reopenClosedIncident: false
matchingMethod: AllEntities
groupByAlertDetails: []
queryFrequency: 1h
triggerOperator: gt
kind: Scheduled
customDetails:
edgeSerialNumber: edgeSerialNumber
tactics:
- Impact
severity: Medium
version: 1.0.0
query: |-
VMware_VECO_EventLogs_CL
| where event == "EDGE_CONGESTED"
| where message contains "high number of packet drops"
| extend edgeSerialNumber = extract("edgeSerialNumber: (.+)$", 1, detail)
id: a88ead0a-f022-48d6-8f53-e5a164c4c72e