Cisco SDWAN - IPS Event Threshold
| Id | dc3627c3-f9de-4f17-bfd3-ba99b64a0a67 |
| Rulename | Cisco SDWAN - IPS Event Threshold |
| Description | This analytic rule will monitor specific IPS event in the data. |
| Severity | High |
| Tactics | InitialAccess |
| Techniques | T1190 T1189 |
| Required data connectors | CiscoSDWAN |
| Kind | Scheduled |
| Query frequency | 3h |
| Query period | 3h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco SD-WAN/Analytic Rules/CiscoSDWANSentinelIPSEventThreshold.yaml |
| Version | 1.0.1 |
| Arm template | dc3627c3-f9de-4f17-bfd3-ba99b64a0a67.json |
CiscoSyslogUTD
| where Classification == "Enter classification"
| summarize count() by Classification
| where count_ > 10
incidentConfiguration:
createIncident: true
relevantTechniques:
- T1190
- T1189
queryFrequency: 3h
description: |
'This analytic rule will monitor specific IPS event in the data.'
triggerThreshold: 0
id: dc3627c3-f9de-4f17-bfd3-ba99b64a0a67
name: Cisco SDWAN - IPS Event Threshold
queryPeriod: 3h
customDetails:
classification_count: count_
classification: Classification
query: |
CiscoSyslogUTD
| where Classification == "Enter classification"
| summarize count() by Classification
| where count_ > 10
severity: High
eventGroupingSettings:
aggregationKind: AlertPerResult
triggerOperator: gt
entityMappings:
- fieldMappings:
- columnName: Classification
identifier: Name
entityType: Malware
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco SD-WAN/Analytic Rules/CiscoSDWANSentinelIPSEventThreshold.yaml
requiredDataConnectors:
- connectorId: CiscoSDWAN
dataTypes:
- CiscoSyslogUTD
status: Available
version: 1.0.1
tactics:
- InitialAccess
kind: Scheduled