Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Mimecast Secure Email Gateway - Internal Email Protect

Back
Idd3bd7640-3600-49f9-8d10-6fe312e68b4f
RulenameMimecast Secure Email Gateway - Internal Email Protect
DescriptionDetects threats from internal email threat protection.
SeverityHigh
TacticsLateralMovement
Persistence
Exfiltration
TechniquesT1534
T1546
Required data connectorsMimecastSEGAPI
KindScheduled
Query frequency15m
Query period15m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastSEG/MimecastCG_Internal_Mail_Protect.yaml
Version1.0.0
Arm templated3bd7640-3600-49f9-8d10-6fe312e68b4f.json
Deploy To Azure
MimecastCG
| where Type == "email_iep"
| extend  SenderEnvelope = ['Sender Envelope']  , MessageId = ['Message ID']
status: Available
queryFrequency: 15m
id: d3bd7640-3600-49f9-8d10-6fe312e68b4f
entityMappings:
- fieldMappings:
  - columnName: SenderEnvelope
    identifier: Sender
  - columnName: Recipients
    identifier: Recipient
  - columnName: MessageId
    identifier: InternetMessageId
  entityType: MailMessage
tactics:
- LateralMovement
- Persistence
- Exfiltration
suppressionDuration: 5h
requiredDataConnectors:
- connectorId: MimecastSEGAPI
  dataTypes:
  - MimecastCG
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastSEG/MimecastCG_Internal_Mail_Protect.yaml
suppressionEnabled: false
eventGroupingSettings:
  aggregationKind: AlertPerResult
query: |
  MimecastCG
  | where Type == "email_iep"
  | extend  SenderEnvelope = ['Sender Envelope']  , MessageId = ['Message ID']  
enabled: true
description: |
    'Detects threats from internal email threat protection.'
relevantTechniques:
- T1534
- T1546
triggerThreshold: 0
queryPeriod: 15m
triggerOperator: gt
name: Mimecast Secure Email Gateway - Internal Email Protect
incidentConfiguration:
  groupingConfiguration:
    matchingMethod: AllEntities
    reopenClosedIncident: false
    enabled: true
    lookbackDuration: P7D
  createIncident: true
severity: High
kind: Scheduled
version: 1.0.0