SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
suppressionDuration: 5h
name: SSG_Security_Incidents
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SINEC Security Guard/Analytic Rules/SSG_Azure_Sentinel_analytic_rule.yaml
severity: HIGH
suppressionEnabled: false
description: The security analytic rule is designed to scrutinize network activity involving private IP addresses within an organization's internal network. By filtering log entries to include only those where either the source or the destination IP is private, the rule focuses on internal communications that could indicate unauthorized access, internal threats, or other security anomalies.
version: 1.0.0
customDetails:
Source_IP: source_ip
relevantTechniques:
- T1486
kind: NRT
id: d41fa731-45a2-4b23-bb1d-29896fbc5298
incidentConfiguration:
groupingConfiguration:
matchingMethod: AnyAlert
lookbackDuration: 5m
enabled: true
reopenClosedIncident: false
groupByEntities:
- IP
groupByAlertDetails: []
groupByCustomDetails:
- Source_IP
createIncident: true
alertDetailsOverride:
alertDescriptionFormat: 'Alert {{signature_name}} generated from {{source_ip}} to {{destination_ip}} '
alertDisplayNameFormat: '{{signature_name}} '
alertDynamicProperties: []
tactics:
- Impact
query: |
SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
eventGroupingSettings:
aggregationKind: AlertPerResult
entityMappings:
- entityType: IP
fieldMappings:
- identifier: Address
columnName: source_ip
- entityType: IP
fieldMappings:
- identifier: Address
columnName: destination_ip