Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Suspicious Domain

Back
Idc56fcb78-b708-4a92-bad4-d50b1e15c42c
RulenameCyble Vision Alerts Suspicious Domain
DescriptionThis Rule generates Cyble Vision Alerts for Service - Suspicious Domain severity LOW
SeverityLow
TacticsReconnaissance
TechniquesT1595
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Suspicious_Domain.yaml
Version1.0.0
Arm templatec56fcb78-b708-4a92-bad4-d50b1e15c42c.json
Deploy To Azure
Alerts_suspicious_domains 
| where Service == "suspicious_domain" 
| extend MappedSeverity = Severity
customDetails:
  MappedSeverity: Severity
  Status: Status
  LiveStatus: SD_IsLive
  Score: SD_Score
  RegistrationDate: SD_RegistrationDate
  A_Records: A_Records
  Service: Service
  MX_Records: MX_Records
  AlertID: AlertID
  Keyword: KeywordName
  Domain: Domain
  NS_Records: NS_Records
  Screenshot: SD_ScreenshotURL
  LastLiveCheck: SD_LastLiveCheck
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Suspicious_Domain.yaml
alertDetailsOverride:
  alertDisplayNameFormat: Suspicious Domain Detected {{Domain}}  {{Status}}
  alertDescriptionFormat: |
        Suspicious Domain detected for {{Domain}} with {{Status}}
  alertDynamicProperties: []
query: |
  Alerts_suspicious_domains 
  | where Service == "suspicious_domain" 
  | extend MappedSeverity = Severity  
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    enabled: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
  createIncident: true
relevantTechniques:
- T1595
kind: Scheduled
name: Cyble Vision Alerts Suspicious Domain
tactics:
- Reconnaissance
severity: Low
suppressionDuration: PT5H
enabled: true
subTechniques: []
queryFrequency: 30m
description: |
    'This Rule generates Cyble Vision Alerts for Service - Suspicious Domain severity LOW'
eventGroupingSettings:
  aggregationKind: AlertPerResult
triggerThreshold: 0
triggerOperator: GreaterThan
version: 1.0.0
entityMappings:
- fieldMappings:
  - identifier: DomainName
    columnName: Domain
  entityType: DNS
queryPeriod: 30m
id: c56fcb78-b708-4a92-bad4-d50b1e15c42c