SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
eventGroupingSettings:
aggregationKind: AlertPerResult
id: d41fa731-45a2-4b23-bb1d-29896fbc5298
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SINEC Security Guard/Analytic Rules/SSG_Azure_Sentinel_analytic_rule.yaml
alertDetailsOverride:
alertDisplayNameFormat: '{{signature_name}} '
alertDescriptionFormat: 'Alert {{signature_name}} generated from {{source_ip}} to {{destination_ip}} '
alertDynamicProperties: []
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: true
lookbackDuration: 5m
reopenClosedIncident: false
groupByAlertDetails: []
groupByCustomDetails:
- Source_IP
matchingMethod: AnyAlert
groupByEntities:
- IP
suppressionDuration: 5h
suppressionEnabled: false
name: SSG_Security_Incidents
relevantTechniques:
- T1486
description: The security analytic rule is designed to scrutinize network activity involving private IP addresses within an organization's internal network. By filtering log entries to include only those where either the source or the destination IP is private, the rule focuses on internal communications that could indicate unauthorized access, internal threats, or other security anomalies.
query: |
SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
version: 1.0.0
tactics:
- Impact
entityMappings:
- fieldMappings:
- identifier: Address
columnName: source_ip
entityType: IP
- fieldMappings:
- identifier: Address
columnName: destination_ip
entityType: IP
severity: HIGH
customDetails:
Source_IP: source_ip
kind: NRT