Samsung_Knox_Audit_CL
| where Name == "LOG_IS_FULL"
and MitreTtp has "KNOX.1"
incidentConfiguration:
createIncident: true
groupingConfiguration:
matchingMethod: AllEntities
lookbackDuration: PT5H
reopenClosedIncident: false
enabled: false
requiredDataConnectors:
- dataTypes:
- Samsung_Knox_Audit_CL
connectorId: SamsungDCDefinition
relevantTechniques: []
description: When the Knox Security Log is full on a device.
severity: High
suppressionEnabled: false
suppressionDuration: PT5H
name: Samsung Knox - Security Log Full Events
query: |
Samsung_Knox_Audit_CL
| where Name == "LOG_IS_FULL"
and MitreTtp has "KNOX.1"
tactics: []
version: 1.0.2
kind: NRT
id: bf9be360-7f08-48b2-8e9d-ca240c48b404
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Samsung Knox Asset Intelligence/Analytic Rules/SamsungKnoxSecurityLogFull.yaml
eventGroupingSettings:
aggregationKind: SingleAlert
status: Available