Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

PaloAlto - Dropping or denying session with traffic

Back
Idba663b74-51f4-11ec-bf63-0242ac130002
RulenamePaloAlto - Dropping or denying session with traffic
DescriptionDetects dropping or denying session with traffic.
SeverityMedium
TacticsInitialAccess
TechniquesT1190
T1133
Required data connectorsCefAma
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/PaloAltoCDL/Analytic Rules/PaloAltoCDLDroppingSessionWithSentTraffic.yaml
Version1.0.4
Arm templateba663b74-51f4-11ec-bf63-0242ac130002.json
Deploy To Azure
let threshold = 100;
PaloAltoCDLEvent
| where EventResourceId =~ 'TRAFFIC'
| where EventResult has_any ("deny", "drop", "reject") 
| where tolong(DstBytes) > 0
| where tolong(NetworkPackets) > 0
| summarize count() by SrcIpAddr, DstUsername, bin(TimeGenerated, 10m)
| where count_ > threshold
| extend AccountCustomEntity = DstUsername, IPCustomEntity = SrcIpAddr
relevantTechniques:
- T1190
- T1133
name: PaloAlto - Dropping or denying session with traffic
requiredDataConnectors:
- dataTypes:
  - CommonSecurityLog
  connectorId: CefAma
entityMappings:
- fieldMappings:
  - identifier: Name
    columnName: AccountCustomEntity
  entityType: Account
- fieldMappings:
  - identifier: Address
    columnName: IPCustomEntity
  entityType: IP
triggerThreshold: 0
id: ba663b74-51f4-11ec-bf63-0242ac130002
tactics:
- InitialAccess
version: 1.0.4
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/PaloAltoCDL/Analytic Rules/PaloAltoCDLDroppingSessionWithSentTraffic.yaml
queryPeriod: 1h
kind: Scheduled
queryFrequency: 1h
severity: Medium
status: Available
description: |
    'Detects dropping or denying session with traffic.'
query: |
  let threshold = 100;
  PaloAltoCDLEvent
  | where EventResourceId =~ 'TRAFFIC'
  | where EventResult has_any ("deny", "drop", "reject") 
  | where tolong(DstBytes) > 0
  | where tolong(NetworkPackets) > 0
  | summarize count() by SrcIpAddr, DstUsername, bin(TimeGenerated, 10m)
  | where count_ > threshold
  | extend AccountCustomEntity = DstUsername, IPCustomEntity = SrcIpAddr  
triggerOperator: gt
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/ba663b74-51f4-11ec-bf63-0242ac130002')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/ba663b74-51f4-11ec-bf63-0242ac130002')]",
      "properties": {
        "alertRuleTemplateName": "ba663b74-51f4-11ec-bf63-0242ac130002",
        "customDetails": null,
        "description": "'Detects dropping or denying session with traffic.'\n",
        "displayName": "PaloAlto - Dropping or denying session with traffic",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "Account",
            "fieldMappings": [
              {
                "columnName": "AccountCustomEntity",
                "identifier": "Name"
              }
            ]
          },
          {
            "entityType": "IP",
            "fieldMappings": [
              {
                "columnName": "IPCustomEntity",
                "identifier": "Address"
              }
            ]
          }
        ],
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/PaloAltoCDL/Analytic Rules/PaloAltoCDLDroppingSessionWithSentTraffic.yaml",
        "query": "let threshold = 100;\nPaloAltoCDLEvent\n| where EventResourceId =~ 'TRAFFIC'\n| where EventResult has_any (\"deny\", \"drop\", \"reject\") \n| where tolong(DstBytes) > 0\n| where tolong(NetworkPackets) > 0\n| summarize count() by SrcIpAddr, DstUsername, bin(TimeGenerated, 10m)\n| where count_ > threshold\n| extend AccountCustomEntity = DstUsername, IPCustomEntity = SrcIpAddr\n",
        "queryFrequency": "PT1H",
        "queryPeriod": "PT1H",
        "severity": "Medium",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [
          "InitialAccess"
        ],
        "techniques": [
          "T1133",
          "T1190"
        ],
        "templateVersion": "1.0.4",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}