Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Suspicious Domain

Back
Idc56fcb78-b708-4a92-bad4-d50b1e15c42c
RulenameCyble Vision Alerts Suspicious Domain
DescriptionThis Rule generates Cyble Vision Alerts for Service - Suspicious Domain severity LOW
SeverityLow
TacticsReconnaissance
TechniquesT1595
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Suspicious_Domain.yaml
Version1.0.0
Arm templatec56fcb78-b708-4a92-bad4-d50b1e15c42c.json
Deploy To Azure
Alerts_suspicious_domains 
| where Service == "suspicious_domain" 
| extend MappedSeverity = Severity
subTechniques: []
status: Available
enabled: true
triggerOperator: GreaterThan
version: 1.0.0
tactics:
- Reconnaissance
alertDetailsOverride:
  alertDisplayNameFormat: Suspicious Domain Detected {{Domain}}  {{Status}}
  alertDescriptionFormat: |
        Suspicious Domain detected for {{Domain}} with {{Status}}
  alertDynamicProperties: []
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: false
    lookbackDuration: PT5H
    reopenClosedIncident: false
suppressionDuration: PT5H
queryFrequency: 30m
id: c56fcb78-b708-4a92-bad4-d50b1e15c42c
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
name: Cyble Vision Alerts Suspicious Domain
description: |
    'This Rule generates Cyble Vision Alerts for Service - Suspicious Domain severity LOW'
customDetails:
  Screenshot: SD_ScreenshotURL
  A_Records: A_Records
  LastLiveCheck: SD_LastLiveCheck
  Status: Status
  Keyword: KeywordName
  Domain: Domain
  NS_Records: NS_Records
  Score: SD_Score
  LiveStatus: SD_IsLive
  AlertID: AlertID
  MappedSeverity: Severity
  Service: Service
  MX_Records: MX_Records
  RegistrationDate: SD_RegistrationDate
relevantTechniques:
- T1595
entityMappings:
- entityType: DNS
  fieldMappings:
  - columnName: Domain
    identifier: DomainName
query: |
  Alerts_suspicious_domains 
  | where Service == "suspicious_domain" 
  | extend MappedSeverity = Severity  
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Suspicious_Domain.yaml
triggerThreshold: 0
queryPeriod: 30m
severity: Low
kind: Scheduled
eventGroupingSettings:
  aggregationKind: AlertPerResult