Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Mimecast Secure Email Gateway - Virus

Back
Idd78d7352-fa5a-47d4-b48f-cb2c3252c0eb
RulenameMimecast Secure Email Gateway - Virus
DescriptionDetect threat for virus from mail receipt virus event.
SeverityInformational
TacticsExecution
TechniquesT1053
Required data connectorsMimecastSEGAPI
KindScheduled
Query frequency15m
Query period15m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastSEG/MimecastCG_Virus.yaml
Version1.0.0
Arm templated78d7352-fa5a-47d4-b48f-cb2c3252c0eb.json
Deploy To Azure
MimecastCG
| where Type == "email_receipt" and isnotempty(['Virus Found'])
| extend  SenderEnvelope = ['Sender Envelope']
kind: Scheduled
status: Available
enabled: true
triggerOperator: gt
version: 1.0.0
tactics:
- Execution
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: true
    lookbackDuration: P7D
    reopenClosedIncident: false
suppressionDuration: 5h
queryFrequency: 15m
id: d78d7352-fa5a-47d4-b48f-cb2c3252c0eb
requiredDataConnectors:
- connectorId: MimecastSEGAPI
  dataTypes:
  - MimecastCG
suppressionEnabled: false
name: Mimecast Secure Email Gateway - Virus
description: |
    'Detect threat for virus from mail receipt virus event.'
relevantTechniques:
- T1053
entityMappings:
- entityType: MailMessage
  fieldMappings:
  - columnName: SenderEnvelope
    identifier: Sender
  - columnName: Recipients
    identifier: Recipient
  - columnName: Subject
    identifier: Subject
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastSEG/MimecastCG_Virus.yaml
triggerThreshold: 0
queryPeriod: 15m
severity: Informational
query: |
  MimecastCG
  | where Type == "email_receipt" and isnotempty(['Virus Found'])
  | extend  SenderEnvelope = ['Sender Envelope']  
eventGroupingSettings:
  aggregationKind: AlertPerResult