Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Recorded Future Identity - Credential Exposure Detected

Back
Idb1c2d3e4-5678-90ab-cdef-444444444444
RulenameRecorded Future Identity - Credential Exposure Detected
DescriptionCreates incidents when Recorded Future Identity detects compromised credentials for users in your organization
SeverityHigh
TacticsCredentialAccess
KindNRT
Query frequency15m
Query period15m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded Future Identity/Analytic Rules/IncidentCreation/RecordedFutureIdentityExposure.yaml
Version1.0.0
Arm templateb1c2d3e4-5678-90ab-cdef-444444444444.json
Deploy To Azure
RecordedFutureIdentity_PlaybookAlertResults_CL
| where TimeGenerated >= now(-15m)
id: b1c2d3e4-5678-90ab-cdef-444444444444
triggerOperator: gt
entityMappings:
- fieldMappings:
  - identifier: Name
    columnName: panel_status_entity_name_s
  entityType: Account
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryFrequency: 15m
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: 'Identity Exposure: {{panel_status_entity_name_s}} with priority: {{panel_status_priority_s}}'
  alertDescriptionFormat: |
    _Recorded Future Identity Alert_

    **Rule Name:** {{panel_status_alert_rule_name_s}}

    **Alert ID:** {{playbook_alert_id_s}}

    **Evidence Summary:** {{alert_description_s}}

    Investigate this identity by searching in log analytics workspace for the Alert ID.    
queryPeriod: 15m
status: Available
incidentConfiguration:
  groupingConfiguration:
    lookbackDuration: 15m
    groupByAlertDetails: []
    reopenClosedIncident: false
    matchingMethod: AllEntities
    groupByCustomDetails: []
    groupByEntities:
    - Account
    enabled: true
  createIncident: true
query: |
  RecordedFutureIdentity_PlaybookAlertResults_CL
  | where TimeGenerated >= now(-15m)  
name: Recorded Future Identity - Credential Exposure Detected
kind: NRT
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded Future Identity/Analytic Rules/IncidentCreation/RecordedFutureIdentityExposure.yaml
tactics:
- CredentialAccess
severity: High
relevantTechniques: []
triggerThreshold: 0
version: 1.0.0
description: |
    'Creates incidents when Recorded Future Identity detects compromised credentials for users in your organization'
customDetails:
  AlertId: playbook_alert_id_s
  RFLabel: Type