SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
entityMappings:
- entityType: IP
fieldMappings:
- columnName: source_ip
identifier: Address
- entityType: IP
fieldMappings:
- columnName: destination_ip
identifier: Address
description: The security analytic rule is designed to scrutinize network activity involving private IP addresses within an organization's internal network. By filtering log entries to include only those where either the source or the destination IP is private, the rule focuses on internal communications that could indicate unauthorized access, internal threats, or other security anomalies.
alertDetailsOverride:
alertDisplayNameFormat: '{{signature_name}} '
alertDynamicProperties: []
alertDescriptionFormat: 'Alert {{signature_name}} generated from {{source_ip}} to {{destination_ip}} '
query: |
SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
tactics:
- Impact
relevantTechniques:
- T1486
suppressionDuration: 5h
incidentConfiguration:
groupingConfiguration:
enabled: true
groupByEntities:
- IP
groupByAlertDetails: []
matchingMethod: AnyAlert
lookbackDuration: 5m
groupByCustomDetails:
- Source_IP
reopenClosedIncident: false
createIncident: true
name: SSG_Security_Incidents
eventGroupingSettings:
aggregationKind: AlertPerResult
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SINEC Security Guard/Analytic Rules/SSG_Azure_Sentinel_analytic_rule.yaml
severity: HIGH
kind: NRT
suppressionEnabled: false
customDetails:
Source_IP: source_ip
id: d41fa731-45a2-4b23-bb1d-29896fbc5298
version: 1.0.0