Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Netskope - UnsanctionedRisky Cloud App Access Shadow IT

Back
Idcdc01279-d6ea-41b1-a32d-49d726be95b8
RulenameNetskope - Unsanctioned/Risky Cloud App Access (Shadow IT)
DescriptionAlerts when users access unsanctioned or risky cloud applications based on Cloud Confidence Level (CCL) and app tags. Detects Shadow IT usage.
SeverityMedium
TacticsInitialAccess
Exfiltration
TechniquesT1199
T1567
Required data connectorsNetskopeWebTxConnector
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/NetskopeWebTx/Analytic Rules/NetskopeWebtx_Rule10.yaml
Version1.0.0
Arm templatecdc01279-d6ea-41b1-a32d-49d726be95b8.json
Deploy To Azure
NetskopeWebTransactions_CL
| where TimeGenerated > ago(1h)
| where isnotempty(CsUsername) and isnotempty(XCsApp)
| where XCsAppTags contains 'Unsanctioned' 
    or XCsAppCcl =~ 'poor'
    or XCsAppCcl =~ 'low'
    or XCsAppCci < 50
| summarize 
    EventCount = count(),
    TotalBytesMB = round(sum(Bytes) / 1048576.0, 2),
    Activities = make_set(XCsAppActivity),
    FirstSeen = min(TimeGenerated),
    LastSeen = max(TimeGenerated)
    by 
    CsUsername,
    XCsApp,
    XCsAppCategory,
    XCsAppCcl,
    XCsAppCci,
    XCsAppTags,
    XCCountry,
    XCDevice
| extend RiskLevel = case(
    XCsAppCci < 30, 'Critical',
    XCsAppCci < 50, 'High',
    XCsAppCci < 70, 'Medium',
    'Low')
| project 
    TimeGenerated = LastSeen,
    User = CsUsername,
    RiskyApplication = XCsApp,
    AppCategory = XCsAppCategory,
    CloudConfidenceLevel = XCsAppCcl,
    CloudConfidenceIndex = XCsAppCci,
    AppTags = XCsAppTags,
    RiskLevel,
    Country = XCCountry,
    Device = XCDevice,
    Activities,
    EventCount,
    DataTransferMB = TotalBytesMB
requiredDataConnectors:
- dataTypes:
  - NetskopeWebTransactions_CL
  connectorId: NetskopeWebTxConnector
relevantTechniques:
- T1199
- T1567
triggerOperator: gt
version: 1.0.0
queryFrequency: 1h
severity: Medium
triggerThreshold: 0
entityMappings:
- fieldMappings:
  - columnName: User
    identifier: Name
  entityType: Account
- fieldMappings:
  - columnName: RiskyApplication
    identifier: Name
  entityType: CloudApplication
name: Netskope - Unsanctioned/Risky Cloud App Access (Shadow IT)
query: |
  NetskopeWebTransactions_CL
  | where TimeGenerated > ago(1h)
  | where isnotempty(CsUsername) and isnotempty(XCsApp)
  | where XCsAppTags contains 'Unsanctioned' 
      or XCsAppCcl =~ 'poor'
      or XCsAppCcl =~ 'low'
      or XCsAppCci < 50
  | summarize 
      EventCount = count(),
      TotalBytesMB = round(sum(Bytes) / 1048576.0, 2),
      Activities = make_set(XCsAppActivity),
      FirstSeen = min(TimeGenerated),
      LastSeen = max(TimeGenerated)
      by 
      CsUsername,
      XCsApp,
      XCsAppCategory,
      XCsAppCcl,
      XCsAppCci,
      XCsAppTags,
      XCCountry,
      XCDevice
  | extend RiskLevel = case(
      XCsAppCci < 30, 'Critical',
      XCsAppCci < 50, 'High',
      XCsAppCci < 70, 'Medium',
      'Low')
  | project 
      TimeGenerated = LastSeen,
      User = CsUsername,
      RiskyApplication = XCsApp,
      AppCategory = XCsAppCategory,
      CloudConfidenceLevel = XCsAppCcl,
      CloudConfidenceIndex = XCsAppCci,
      AppTags = XCsAppTags,
      RiskLevel,
      Country = XCCountry,
      Device = XCDevice,
      Activities,
      EventCount,
      DataTransferMB = TotalBytesMB  
tactics:
- InitialAccess
- Exfiltration
queryPeriod: 1h
description: |
    Alerts when users access unsanctioned or risky cloud applications based on Cloud Confidence Level (CCL) and app tags. Detects Shadow IT usage.
kind: Scheduled
id: cdc01279-d6ea-41b1-a32d-49d726be95b8
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/NetskopeWebTx/Analytic Rules/NetskopeWebtx_Rule10.yaml
status: Available