VMware SD-WAN Edge - IDSIPS Alert triggered Syslog
| Id | a8e2bfd2-5d9c-4acc-aa55-30029e50d574 |
| Rulename | VMware SD-WAN Edge - IDS/IPS Alert triggered (Syslog) |
| Description | The VMware SD-WAN Edge appliance captured a potentially malicious traffic flow. Please investigate the IOC information available. This analytics rule analyzes Syslog streams. |
| Severity | High |
| Tactics | LateralMovement |
| Techniques | T1210 |
| Required data connectors | VMwareSDWAN |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sdwan-idps-alert-syslog.yaml |
| Version | 1.0.0 |
| Arm template | a8e2bfd2-5d9c-4acc-aa55-30029e50d574.json |
Syslog
| where SyslogMessage contains "VCF Alert"
| project-rename EdgeName=HostName
| project-away Computer, HostIP, SourceSystem, Type
| extend IdpsSignatureName = extract("SIGNATURE=(.+) CATEGORY=", 1, SyslogMessage)
| extend IdpsAlertCategory = extract("CATEGORY=(.+) SEVERITY=", 1, SyslogMessage)
| extend IdpsAlertSeverity = extract("SEVERITY=(.+) SRC_IP=", 1, SyslogMessage)
| extend IdpsSignatureId = extract("SIG_ID=([0-9]+) SIGNATURE=", 1, SyslogMessage)
| extend OverlaySegmentName = extract("SEGMENT_NAME=(.+) SIG_ID=", 1, SyslogMessage)
| extend IpProtocol = extract("PROTO=([A-Z]+) SRC=", 1, SyslogMessage)
| extend SrcIpAddress = extract("SRC=(.+) DST=", 1, SyslogMessage)
| extend SrcPort = extract("SPT=([0-9]+) DPT=", 1, SyslogMessage)
| extend DstIpAddress = extract("DST=(.+) SPT=", 1, SyslogMessage)
| extend DstPort = extract("DPT=(.+) DEST_DOMAIN=", 1, SyslogMessage)
| extend VictimIp = extract("TARGET_IP=(.+) TARGET_PORT=", 1, SyslogMessage)
| extend AttackerIp = extract("SRC_IP=(.+) SRC_PORT=", 1, SyslogMessage)
| extend DomainName = extract("DEST_DOMAIN=(.+) FW_POLICY_NAME=", 1, SyslogMessage)
| extend EdgeFwAction = extract("ATP_ACTION=(.+) SEGMENT=", 1, SyslogMessage)
| extend SyslogTag = extract("$(.+): ACTION=", 1, SyslogMessage)
| extend FwPolicyName = extract("FW_POLICY_NAME=(.+) SEGMENT_NAME=", 1, SyslogMessage)
| project
TimeGenerated,
IdpsSignatureName,
IdpsAlertSeverity,
IdpsAlertCategory,
IdpsSignatureId,
EdgeFwAction,
EdgeName,
SrcIpAddress,
IpProtocol,
SrcPort,
DstIpAddress,
DstPort,
DomainName,
AttackerIp,
VictimIp,
FwPolicyName,
SyslogTag
queryPeriod: 1h
query: |-
Syslog
| where SyslogMessage contains "VCF Alert"
| project-rename EdgeName=HostName
| project-away Computer, HostIP, SourceSystem, Type
| extend IdpsSignatureName = extract("SIGNATURE=(.+) CATEGORY=", 1, SyslogMessage)
| extend IdpsAlertCategory = extract("CATEGORY=(.+) SEVERITY=", 1, SyslogMessage)
| extend IdpsAlertSeverity = extract("SEVERITY=(.+) SRC_IP=", 1, SyslogMessage)
| extend IdpsSignatureId = extract("SIG_ID=([0-9]+) SIGNATURE=", 1, SyslogMessage)
| extend OverlaySegmentName = extract("SEGMENT_NAME=(.+) SIG_ID=", 1, SyslogMessage)
| extend IpProtocol = extract("PROTO=([A-Z]+) SRC=", 1, SyslogMessage)
| extend SrcIpAddress = extract("SRC=(.+) DST=", 1, SyslogMessage)
| extend SrcPort = extract("SPT=([0-9]+) DPT=", 1, SyslogMessage)
| extend DstIpAddress = extract("DST=(.+) SPT=", 1, SyslogMessage)
| extend DstPort = extract("DPT=(.+) DEST_DOMAIN=", 1, SyslogMessage)
| extend VictimIp = extract("TARGET_IP=(.+) TARGET_PORT=", 1, SyslogMessage)
| extend AttackerIp = extract("SRC_IP=(.+) SRC_PORT=", 1, SyslogMessage)
| extend DomainName = extract("DEST_DOMAIN=(.+) FW_POLICY_NAME=", 1, SyslogMessage)
| extend EdgeFwAction = extract("ATP_ACTION=(.+) SEGMENT=", 1, SyslogMessage)
| extend SyslogTag = extract("$(.+): ACTION=", 1, SyslogMessage)
| extend FwPolicyName = extract("FW_POLICY_NAME=(.+) SEGMENT_NAME=", 1, SyslogMessage)
| project
TimeGenerated,
IdpsSignatureName,
IdpsAlertSeverity,
IdpsAlertCategory,
IdpsSignatureId,
EdgeFwAction,
EdgeName,
SrcIpAddress,
IpProtocol,
SrcPort,
DstIpAddress,
DstPort,
DomainName,
AttackerIp,
VictimIp,
FwPolicyName,
SyslogTag
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sdwan-idps-alert-syslog.yaml
name: VMware SD-WAN Edge - IDS/IPS Alert triggered (Syslog)
entityMappings:
- fieldMappings:
- columnName: DomainName
identifier: DomainName
entityType: DNS
- fieldMappings:
- columnName: VictimIp
identifier: Address
entityType: IP
eventGroupingSettings:
aggregationKind: AlertPerResult
suppressionEnabled: false
description: |-
The VMware SD-WAN Edge appliance captured a potentially malicious traffic flow. Please investigate the IOC information available.
This analytics rule analyzes Syslog streams.
kind: Scheduled
version: 1.0.0
suppressionDuration: 5h
queryFrequency: 1h
severity: High
requiredDataConnectors:
- connectorId: VMwareSDWAN
dataTypes:
- SDWAN
triggerOperator: gt
triggerThreshold: 0
incidentConfiguration:
groupingConfiguration:
matchingMethod: AllEntities
reopenClosedIncident: false
groupByEntities: []
groupByAlertDetails: []
lookbackDuration: 1h
groupByCustomDetails: []
enabled: true
createIncident: true
customDetails:
Edge_Name: EdgeName
IDPS_Signature: IdpsSignatureName
IDPS_Event_Category: IdpsAlertCategory
tactics:
- LateralMovement
id: a8e2bfd2-5d9c-4acc-aa55-30029e50d574
relevantTechniques:
- T1210