Egress Defend - Dangerous Link Click
| Id | a896123e-03a5-4a4d-a7e3-fd814846dfb2 |
| Rulename | Egress Defend - Dangerous Link Click |
| Description | Defend has detected a user has clicked a dangerous link in their mailbox. |
| Severity | Medium |
| Tactics | Execution |
| Techniques | T1204 T0853 |
| Required data connectors | EgressDefend |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Egress Defend/Analytic Rules/DangerousLinksClicked.yaml |
| Version | 1.0.0 |
| Arm template | a896123e-03a5-4a4d-a7e3-fd814846dfb2.json |
DefendAuditData
| where LinksClicked > 0
| where ThreatLevel == "dangerous" or ThreatLevel == "suspicious"
| extend Account_0_FullName = trim(@"[^@.\w]+",Recipients)
kind: Scheduled
triggerThreshold: 0
tags:
- Defend
id: a896123e-03a5-4a4d-a7e3-fd814846dfb2
customDetails:
DefendSender: From
timesClicked: LinksClicked
DefendSenderIP: SenderIP
tactics:
- Execution
alertDetailsOverride:
alertDisplayNameFormat: Alert - {{Account_0_FullName}} as clicked a suspicious link.
description: |
'Defend has detected a user has clicked a dangerous link in their mailbox.'
requiredDataConnectors:
- dataTypes:
- EgressDefend_CL
connectorId: EgressDefend
queryPeriod: 30m
version: 1.0.0
severity: Medium
entityMappings:
- fieldMappings:
- columnName: Account_0_FullName
identifier: FullName
entityType: Account
- fieldMappings:
- columnName: SenderIP
identifier: Address
entityType: IP
- fieldMappings:
- columnName: Url
identifier: Url
entityType: URL
- fieldMappings:
- columnName: Account_0_FullName
identifier: MailboxPrimaryAddress
entityType: Mailbox
queryFrequency: 30m
relevantTechniques:
- T1204
- T0853
status: Available
name: Egress Defend - Dangerous Link Click
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Egress Defend/Analytic Rules/DangerousLinksClicked.yaml
triggerOperator: gt
query: |
DefendAuditData
| where LinksClicked > 0
| where ThreatLevel == "dangerous" or ThreatLevel == "suspicious"
| extend Account_0_FullName = trim(@"[^@.\w]+",Recipients)