let threshold = 5;
TMApexOneEvent
| where EventMessage has "Behavior Monitoring"
| where DvcAction == 2 or DvcAction == 3
| summarize count() by SrcIpAddr, bin(TimeGenerated, 10m)
| where count_ > threshold
| extend IPCustomEntity = SrcIpAddr
id: cd94e078-67b7-11ec-90d6-0242ac120003
requiredDataConnectors:
- connectorId: CefAma
dataTypes:
- CommonSecurityLog
version: 1.0.3
relevantTechniques:
- T1190
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Trend Micro Apex One/Analytic Rules/TMApexOneMultipleDenyOrTerminateActionOnSingleIp.yaml
description: |
'Detects multiple deny or terminate actions on single IP.'
triggerThreshold: 0
severity: High
queryPeriod: 1h
name: ApexOne - Multiple deny or terminate actions on single IP
kind: Scheduled
tactics:
- InitialAccess
entityMappings:
- entityType: IP
fieldMappings:
- columnName: IPCustomEntity
identifier: Address
status: Available
triggerOperator: gt
query: |
let threshold = 5;
TMApexOneEvent
| where EventMessage has "Behavior Monitoring"
| where DvcAction == 2 or DvcAction == 3
| summarize count() by SrcIpAddr, bin(TimeGenerated, 10m)
| where count_ > threshold
| extend IPCustomEntity = SrcIpAddr
queryFrequency: 1h