Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Dynatrace Application Security - Third-Party runtime vulnerability detection

Back
Idaf99b078-124b-543a-9a50-66ef87c09f6a
RulenameDynatrace Application Security - Third-Party runtime vulnerability detection
DescriptionDetect Third-Party runtime vulnerabilities in your environment insights by snyk
SeverityMedium
TacticsDefenseEvasion
Execution
Impact
InitialAccess
LateralMovement
Persistence
PrivilegeEscalation
TechniquesT1140
T1059
T1565
T1659
T1210
T1554
T1548
Required data connectorsDynatraceRuntimeVulnerabilities
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_ThirdPartyVulnerabilityDetection.yaml
Version1.0.3
Arm templateaf99b078-124b-543a-9a50-66ef87c09f6a.json
Deploy To Azure
DynatraceSecurityProblems
| where VulnerabilityType != "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL"  and Muted == false
| summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
description: |
    'Detect Third-Party runtime vulnerabilities in your environment insights by snyk'
kind: Scheduled
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryFrequency: 1d
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_ThirdPartyVulnerabilityDetection.yaml
alertDetailsOverride:
  alertDisplayNameFormat: 'Dynatrace Third-party runtime vulnerability detected - {{DisplayId}} : {{Title}}'
  alertSeverityColumnName: Severity
  alertDescriptionFormat: |
        Third-party runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
status: Available
triggerOperator: gt
severity: Medium
relevantTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
triggerThreshold: 0
name: Dynatrace Application Security - Third-Party runtime vulnerability detection
customDetails:
  Technology: Technology
  DAVISExposure: DAVISExposure
  ExternVulnIdentifier: ExternalVulnerabilityId
  DAVISRiskVector: DAVISRiskVector
  DAVISRiskScore: DAVISRiskScore
  DAVISPublicExploit: DAVISPublicExploit
  SecProbIdentifier: SecurityProblemId
  PackageName: PackageName
  DAVISDataAssets: DAVISDataAssets
  DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
  DisplayIdentifier: DisplayId
  DAVISRiskLevel: DAVISRiskLevel
  SecurityProblemUrl: Url
  VulnerabilityType: VulnerabilityType
  CVEIds: CVEIds
entityMappings:
- fieldMappings:
  - columnName: Url
    identifier: Url
  entityType: URL
requiredDataConnectors:
- connectorId: DynatraceRuntimeVulnerabilities
  dataTypes:
  - DynatraceSecurityProblems
id: af99b078-124b-543a-9a50-66ef87c09f6a
queryPeriod: 1d
incidentConfiguration:
  createIncident: false
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    reopenClosedIncident: false
    lookbackDuration: PT5H
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
version: 1.0.3
query: |
  DynatraceSecurityProblems
  | where VulnerabilityType != "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL"  and Muted == false
  | summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId