SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
customDetails:
Source_IP: source_ip
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SINEC Security Guard/Analytic Rules/SSG_Azure_Sentinel_analytic_rule.yaml
query: |
SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
eventGroupingSettings:
aggregationKind: AlertPerResult
tactics:
- Impact
incidentConfiguration:
groupingConfiguration:
groupByCustomDetails:
- Source_IP
enabled: true
matchingMethod: AnyAlert
groupByEntities:
- IP
lookbackDuration: 5m
groupByAlertDetails: []
reopenClosedIncident: false
createIncident: true
kind: NRT
name: SSG_Security_Incidents
relevantTechniques:
- T1486
severity: HIGH
suppressionDuration: 5h
entityMappings:
- fieldMappings:
- identifier: Address
columnName: source_ip
entityType: IP
- fieldMappings:
- identifier: Address
columnName: destination_ip
entityType: IP
description: The security analytic rule is designed to scrutinize network activity involving private IP addresses within an organization's internal network. By filtering log entries to include only those where either the source or the destination IP is private, the rule focuses on internal communications that could indicate unauthorized access, internal threats, or other security anomalies.
alertDetailsOverride:
alertDisplayNameFormat: '{{signature_name}} '
alertDescriptionFormat: 'Alert {{signature_name}} generated from {{source_ip}} to {{destination_ip}} '
alertDynamicProperties: []
version: 1.0.0
suppressionEnabled: false
id: d41fa731-45a2-4b23-bb1d-29896fbc5298