Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts I2P Monitoring

Back
Idd1cdfb8d-12cd-4a29-8caf-ef4a35ad67ed
RulenameCyble Vision Alerts I2P Monitoring
DescriptionTriggers when I2P content is detected related to monitored keywords. Useful for identifying extremist narratives, radicalization indicators, or harmful ideological campaigns spreading through I2P hidden services.
SeverityLow
TacticsResourceDevelopment
TechniquesT1585
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_i2p_rule.yaml
Version1.0.0
Arm templated1cdfb8d-12cd-4a29-8caf-ef4a35ad67ed.json
Deploy To Azure
Alerts_i2p  
| where Service == "i2p" 
| extend MappedSeverity = Severity
customDetails:
  I2P_UpdatedOn: I2P_UpdatedOn
  I2P_URL: I2P_URL
  I2P_SearchKeyword: I2P_SearchKeyword
  MappedSeverity: Severity
  AlertID: AlertID
  Service: Service
  Status: Status
id: d1cdfb8d-12cd-4a29-8caf-ef4a35ad67ed
name: Cyble Vision Alerts I2P Monitoring
queryPeriod: 30m
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
incidentConfiguration:
  createIncident: true
  alertDetailsOverride: 
  alertDescriptionFormat: |
        Potentially sensitive or harmful content has been detected on the I2P network. URL {{I2P_URL}}. Content updated on {{I2P_UpdatedOn}}. The captured content may involve extremist ideology, radical discussions, or harmful narratives that require SOC review.
  alertDisplayNameFormat: I2P Content Alert Hidden Service Activity for Keyword {{I2P_SearchKeyword}}
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
    reopenClosedIncident: false
version: 1.0.0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_i2p_rule.yaml
query: |
  Alerts_i2p  
  | where Service == "i2p" 
  | extend MappedSeverity = Severity  
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1585
entityMappings:
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: I2P_URL
enabled: true
severity: Low
kind: Scheduled
triggerThreshold: 0
triggerOperator: GreaterThan
tactics:
- ResourceDevelopment
status: Available
queryfrequency: 30m
description: |
    'Triggers when I2P content is detected related to monitored keywords. Useful for identifying extremist narratives, radicalization indicators, or harmful ideological campaigns spreading through I2P hidden services.'