SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
relevantTechniques:
- T1486
suppressionEnabled: false
kind: NRT
alertDetailsOverride:
alertDynamicProperties: []
alertDescriptionFormat: 'Alert {{signature_name}} generated from {{source_ip}} to {{destination_ip}} '
alertDisplayNameFormat: '{{signature_name}} '
eventGroupingSettings:
aggregationKind: AlertPerResult
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SINEC Security Guard/Analytic Rules/SSG_Azure_Sentinel_analytic_rule.yaml
version: 1.0.0
id: d41fa731-45a2-4b23-bb1d-29896fbc5298
severity: HIGH
name: SSG_Security_Incidents
entityMappings:
- entityType: IP
fieldMappings:
- identifier: Address
columnName: source_ip
- entityType: IP
fieldMappings:
- identifier: Address
columnName: destination_ip
query: |
SINECSecurityGuard_CL
| where ipv4_is_private(source_ip) or ipv4_is_private(destination_ip)
| project source_ip, destination_ip, signature_id, signature_name
incidentConfiguration:
createIncident: true
groupingConfiguration:
matchingMethod: AnyAlert
lookbackDuration: 5m
reopenClosedIncident: false
groupByCustomDetails:
- Source_IP
enabled: true
groupByAlertDetails: []
groupByEntities:
- IP
description: The security analytic rule is designed to scrutinize network activity involving private IP addresses within an organization's internal network. By filtering log entries to include only those where either the source or the destination IP is private, the rule focuses on internal communications that could indicate unauthorized access, internal threats, or other security anomalies.
suppressionDuration: 5h
tactics:
- Impact
customDetails:
Source_IP: source_ip