Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

1Password - Log Ingestion Failure

Back
Idbf9132c7-9d4d-4244-98c7-7d994703c208
Rulename1Password - Log Ingestion Failure
DescriptionThis will alert when the log ingestion for the OnePasswordEventLogs_CL logs is failing. The alert is based on the healthevents that are created every 5 minutes and will trigger if no logs have been received for 1 hour.



Log ingestion troubleshooting:

<insert URL>



Ref: https://1password.com/

Ref: https://github.com/securehats/
SeverityMedium
TacticsDefenseEvasion
TechniquesT1562
Required data connectors1Password
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorEqual
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/1Password/Analytics Rules/1Password - Log Ingestion Failure.yaml
Version1.0.0
Arm templatebf9132c7-9d4d-4244-98c7-7d994703c208.json
Deploy To Azure
OnePasswordEventLogs_CL
| where log_source == "healthevents"
suppressionEnabled: false
relevantTechniques:
- T1562
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
    lookbackDuration: 5h
  createIncident: true
version: 1.0.0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/1Password/Analytics Rules/1Password - Log Ingestion Failure.yaml
suppressionDuration: 5h
id: bf9132c7-9d4d-4244-98c7-7d994703c208
description: |-
  This will alert when the log ingestion for the OnePasswordEventLogs_CL logs is failing. The alert is based on the healthevents that are created every 5 minutes and will trigger if no logs have been received for 1 hour.

  Log ingestion troubleshooting:
  <insert URL>

  Ref: https://1password.com/
  Ref: https://github.com/securehats/  
requiredDataConnectors:
- connectorId: 1Password
  dataTypes:
  - OnePasswordEventLogs_CL
triggerThreshold: 0
subTechniques:
- T1562.008
eventGroupingSettings:
  aggregationKind: SingleAlert
triggerOperator: Equal
queryFrequency: 1h
query: |-
  OnePasswordEventLogs_CL
  | where log_source == "healthevents"  
severity: Medium
queryPeriod: 1h
name: 1Password - Log Ingestion Failure
tactics:
- DefenseEvasion
kind: Scheduled