Apt High
| Id | c115ce23-7b8d-4bc0-9aed-e4e510bcd446 |
| Rulename | Apt (High) |
| Description | New Apt with severity High found |
| Severity | High |
| Tactics | InitialAccess Discovery |
| Techniques | T1566 T1087 |
| Required data connectors | CBSPollingIDAzureFunctions |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/apt_high.yaml |
| Version | 1.0.1 |
| Arm template | c115ce23-7b8d-4bc0-9aed-e4e510bcd446.json |
CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Apt" | where status_s != "Closed" or status_s != "Resolved"
name: Apt (High)
id: c115ce23-7b8d-4bc0-9aed-e4e510bcd446
description: New Apt with severity High found
triggerThreshold: 0
suppressionEnabled: false
version: 1.0.1
triggerOperator: gt
query: CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Apt" | where status_s != "Closed" or status_s != "Resolved"
tactics:
- InitialAccess
- Discovery
suppressionDuration: 5h
kind: Scheduled
queryFrequency: 5m
severity: High
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: PT5H
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
queryPeriod: 5m
requiredDataConnectors:
- dataTypes:
- CBSLog_Azure_1_CL
connectorId: CBSPollingIDAzureFunctions
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/apt_high.yaml
eventGroupingSettings:
aggregationKind: SingleAlert
relevantTechniques:
- T1566
- T1087