VMware_CWS_Weblogs_CL
| where action == "block"
query: |
VMware_CWS_Weblogs_CL
| where action == "block"
requiredDataConnectors:
- dataTypes:
- CWS
connectorId: VMwareSDWAN
name: VMware Cloud Web Security - Web Access Policy Violation
entityMappings:
- fieldMappings:
- identifier: Address
columnName: sourceIp
entityType: IP
- fieldMappings:
- identifier: Name
columnName: virusList
entityType: Malware
- fieldMappings:
- identifier: Url
columnName: url
entityType: URL
- fieldMappings:
- identifier: AadUserId
columnName: userId
entityType: Account
kind: Scheduled
triggerThreshold: 0
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: false
groupByCustomDetails: []
groupByAlertDetails: []
reopenClosedIncident: false
matchingMethod: AllEntities
lookbackDuration: 5h
groupByEntities: []
queryPeriod: 1h
description: VMware Cloud Web Security reported access events which were violating web access policy rules. Additional investigation might be required.
suppressionDuration: 5h
triggerOperator: gt
suppressionEnabled: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sase-cws-policyviolation.yaml
version: 1.0.0
queryFrequency: 1h
severity: Medium
eventGroupingSettings:
aggregationKind: AlertPerResult
id: b84a1f62-ad30-4ae1-8b21-3d304d8aa818