Cisco SDWAN - IPS Event Threshold
| Id | dc3627c3-f9de-4f17-bfd3-ba99b64a0a67 |
| Rulename | Cisco SDWAN - IPS Event Threshold |
| Description | This analytic rule will monitor specific IPS event in the data. |
| Severity | High |
| Tactics | InitialAccess |
| Techniques | T1190 T1189 |
| Required data connectors | CiscoSDWAN |
| Kind | Scheduled |
| Query frequency | 3h |
| Query period | 3h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco SD-WAN/Analytic Rules/CiscoSDWANSentinelIPSEventThreshold.yaml |
| Version | 1.0.1 |
| Arm template | dc3627c3-f9de-4f17-bfd3-ba99b64a0a67.json |
CiscoSyslogUTD
| where Classification == "Enter classification"
| summarize count() by Classification
| where count_ > 10
name: Cisco SDWAN - IPS Event Threshold
id: dc3627c3-f9de-4f17-bfd3-ba99b64a0a67
description: |
'This analytic rule will monitor specific IPS event in the data.'
triggerThreshold: 0
entityMappings:
- fieldMappings:
- columnName: Classification
identifier: Name
entityType: Malware
version: 1.0.1
triggerOperator: gt
query: |
CiscoSyslogUTD
| where Classification == "Enter classification"
| summarize count() by Classification
| where count_ > 10
tactics:
- InitialAccess
kind: Scheduled
queryFrequency: 3h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco SD-WAN/Analytic Rules/CiscoSDWANSentinelIPSEventThreshold.yaml
severity: High
incidentConfiguration:
createIncident: true
queryPeriod: 3h
requiredDataConnectors:
- dataTypes:
- CiscoSyslogUTD
connectorId: CiscoSDWAN
status: Available
customDetails:
classification: Classification
classification_count: count_
eventGroupingSettings:
aggregationKind: AlertPerResult
relevantTechniques:
- T1190
- T1189