Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Theom Insights

Back
Idd200da84-0191-44ce-ad9e-b85e64c84c89
RulenameTheom Insights
Description“Creates Microsoft Sentinel incidents for Theom insight alerts.”
SeverityLow
TacticsCollection
CommandAndControl
CredentialAccess
DefenseEvasion
Discovery
Exfiltration
Impact
Reconnaissance
TechniquesT1592
T1589
T1070
T1552
T1619
T1119
T1560
T1530
T1213
T1001
T1041
T1537
T1485
T1486
T1565
Required data connectorsTheom
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TheomRisksInsights.yaml
Version1.0.2
Arm templated200da84-0191-44ce-ad9e-b85e64c84c89.json
Deploy To Azure
TheomAlerts_CL
 | where priority_s == "P5"
alertDetailsOverride:
  alertDescriptionFormat: |2

    Summary: {{summary_s}}  
    Additional info: {{details_s}}
    Resource ID: {{customProps_AssetName_s}}
  alertDisplayNameFormat: 'Theom Alert ID: {{id_s}} '
query: |
  TheomAlerts_CL
   | where priority_s == "P5"  
description: |
    "Creates Microsoft Sentinel incidents for Theom insight alerts."
triggerThreshold: 0
requiredDataConnectors:
- dataTypes:
  - TheomAlerts_CL
  connectorId: Theom
name: Theom Insights
relevantTechniques:
- T1592
- T1589
- T1070
- T1552
- T1619
- T1119
- T1560
- T1530
- T1213
- T1001
- T1041
- T1537
- T1485
- T1486
- T1565
queryPeriod: 5m
severity: Low
triggerOperator: gt
version: 1.0.2
queryFrequency: 5m
eventGroupingSettings:
  aggregationKind: AlertPerResult
entityMappings:
- entityType: CloudApplication
  fieldMappings:
  - identifier: Name
    columnName: customProps_AssetName_s
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: deepLink_s
kind: Scheduled
status: Available
tactics:
- Collection
- CommandAndControl
- CredentialAccess
- DefenseEvasion
- Discovery
- Exfiltration
- Impact
- Reconnaissance
id: d200da84-0191-44ce-ad9e-b85e64c84c89
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TheomRisksInsights.yaml
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/d200da84-0191-44ce-ad9e-b85e64c84c89')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/d200da84-0191-44ce-ad9e-b85e64c84c89')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "\nSummary: {{summary_s}}  \nAdditional info: {{details_s}}\nResource ID: {{customProps_AssetName_s}}\n",
          "alertDisplayNameFormat": "Theom Alert ID: {{id_s}} "
        },
        "alertRuleTemplateName": "d200da84-0191-44ce-ad9e-b85e64c84c89",
        "customDetails": null,
        "description": "\"Creates Microsoft Sentinel incidents for Theom insight alerts.\"\n",
        "displayName": "Theom Insights",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "CloudApplication",
            "fieldMappings": [
              {
                "columnName": "customProps_AssetName_s",
                "identifier": "Name"
              }
            ]
          },
          {
            "entityType": "URL",
            "fieldMappings": [
              {
                "columnName": "deepLink_s",
                "identifier": "Url"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TheomRisksInsights.yaml",
        "query": "TheomAlerts_CL\n | where priority_s == \"P5\"\n",
        "queryFrequency": "PT5M",
        "queryPeriod": "PT5M",
        "severity": "Low",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [
          "Collection",
          "CommandAndControl",
          "CredentialAccess",
          "DefenseEvasion",
          "Discovery",
          "Exfiltration",
          "Impact",
          "Reconnaissance"
        ],
        "techniques": [
          "T1001",
          "T1041",
          "T1070",
          "T1119",
          "T1213",
          "T1485",
          "T1486",
          "T1530",
          "T1537",
          "T1552",
          "T1560",
          "T1565",
          "T1589",
          "T1592",
          "T1619"
        ],
        "templateVersion": "1.0.2",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}