Cisco SDWAN - IPS Event Threshold
| Id | dc3627c3-f9de-4f17-bfd3-ba99b64a0a67 |
| Rulename | Cisco SDWAN - IPS Event Threshold |
| Description | This analytic rule will monitor specific IPS event in the data. |
| Severity | High |
| Tactics | InitialAccess |
| Techniques | T1190 T1189 |
| Required data connectors | CiscoSDWAN |
| Kind | Scheduled |
| Query frequency | 3h |
| Query period | 3h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco SD-WAN/Analytic Rules/CiscoSDWANSentinelIPSEventThreshold.yaml |
| Version | 1.0.1 |
| Arm template | dc3627c3-f9de-4f17-bfd3-ba99b64a0a67.json |
CiscoSyslogUTD
| where Classification == "Enter classification"
| summarize count() by Classification
| where count_ > 10
severity: High
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco SD-WAN/Analytic Rules/CiscoSDWANSentinelIPSEventThreshold.yaml
id: dc3627c3-f9de-4f17-bfd3-ba99b64a0a67
customDetails:
classification: Classification
classification_count: count_
entityMappings:
- fieldMappings:
- identifier: Name
columnName: Classification
entityType: Malware
kind: Scheduled
status: Available
tactics:
- InitialAccess
queryFrequency: 3h
eventGroupingSettings:
aggregationKind: AlertPerResult
requiredDataConnectors:
- connectorId: CiscoSDWAN
dataTypes:
- CiscoSyslogUTD
relevantTechniques:
- T1190
- T1189
version: 1.0.1
incidentConfiguration:
createIncident: true
description: |
'This analytic rule will monitor specific IPS event in the data.'
triggerThreshold: 0
query: |
CiscoSyslogUTD
| where Classification == "Enter classification"
| summarize count() by Classification
| where count_ > 10
queryPeriod: 3h
name: Cisco SDWAN - IPS Event Threshold