Illumio VEN Deactivated Detection Rule
| Id | c18bd8c2-50f0-4aa2-8122-d449243627d7 |
| Rulename | Illumio VEN Deactivated Detection Rule |
| Description | Create Microsoft Sentinel Incident When Ven Goes Into Deactivated state |
| Severity | High |
| Tactics | DefenseEvasion |
| Techniques | T1562 |
| Required data connectors | IllumioSaaSDataConnector SyslogAma |
| Kind | Scheduled |
| Query frequency | 60m |
| Query period | 60m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/IllumioSaaS/Analytic Rules/Illumio_VEN_Deactivated_Query.yaml |
| Version | 1.0.6 |
| Arm template | c18bd8c2-50f0-4aa2-8122-d449243627d7.json |
Illumio_Auditable_Events_CL
| union IllumioSyslogAuditEvents
| where event_type has 'agent.deactivate'
| mv-expand resource_changes
| extend hostname = resource_changes['resource']['workload']['hostname'],
workload_href = resource_changes['resource']['workload']['href'],
workload_labels = resource_changes['resource']['workload']['labels']
| extend ipaddress = action.src_ip,
ven_href = created_by.ven.href
| project-away resource_changes, action, version
eventGroupingSettings:
aggregationKind: SingleAlert
triggerThreshold: 0
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: hostname
- entityType: IP
fieldMappings:
- identifier: Address
columnName: ipaddress
requiredDataConnectors:
- dataTypes:
- Illumio_Auditable_Events_CL
connectorId: IllumioSaaSDataConnector
- datatypes:
- Syslog
connectorId: SyslogAma
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/IllumioSaaS/Analytic Rules/Illumio_VEN_Deactivated_Query.yaml
name: Illumio VEN Deactivated Detection Rule
alertDetailsOverride:
alertDisplayNameFormat: |
Illumio VEN Deactivated Incident
alertDescriptionFormat: |
Illumio VEN Deactivated Incident generated at {{TimeGenerated}}
relevantTechniques:
- T1562
status: Available
version: 1.0.6
queryPeriod: 60m
kind: Scheduled
id: c18bd8c2-50f0-4aa2-8122-d449243627d7
query: |
Illumio_Auditable_Events_CL
| union IllumioSyslogAuditEvents
| where event_type has 'agent.deactivate'
| mv-expand resource_changes
| extend hostname = resource_changes['resource']['workload']['hostname'],
workload_href = resource_changes['resource']['workload']['href'],
workload_labels = resource_changes['resource']['workload']['labels']
| extend ipaddress = action.src_ip,
ven_href = created_by.ven.href
| project-away resource_changes, action, version
description: |
'Create Microsoft Sentinel Incident When Ven Goes Into Deactivated state'
queryFrequency: 60m
severity: High
triggerOperator: gt
tactics:
- DefenseEvasion