Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

BloodHound Enterprise - Number of critical attack paths increase

Back
Iddf292d06-f348-41ad-b780-0abb5acfe9ab
RulenameBloodHound Enterprise - Number of critical attack paths increase
DescriptionThe number of critical attack paths has increased over the past 7 days.
SeverityMedium
Required data connectorsBloodHoundEnterprise
KindScheduled
Query frequency7d
Query period7d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/BloodHound Enterprise/Analytic Rules/BloodHoundEnterpriseCriticalAttackPaths.yaml
Version1.0.1
Arm templatedf292d06-f348-41ad-b780-0abb5acfe9ab.json
Deploy To Azure
BloodHoundEnterprise
| where data_type == "posture"
| where created_at > ago (7d)
| summarize min_critical_risk_count = min(critical_risk_count), arg_max(created_at, current_critical_risk_count = critical_risk_count) by domain_name
| extend  difference = current_critical_risk_count - min_critical_risk_count
| where difference > 0
queryFrequency: 7d
tactics: []
queryPeriod: 7d
kind: Scheduled
relevantTechniques: []
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/BloodHound Enterprise/Analytic Rules/BloodHoundEnterpriseCriticalAttackPaths.yaml
description: |
    'The number of critical attack paths has increased over the past 7 days.'
requiredDataConnectors:
- dataTypes:
  - BloodHoundEnterprise
  connectorId: BloodHoundEnterprise
version: 1.0.1
triggerThreshold: 0
severity: Medium
triggerOperator: gt
id: df292d06-f348-41ad-b780-0abb5acfe9ab
entityMappings:
- entityType: DNS
  fieldMappings:
  - displayName: domain_name
    identifier: DomainName
status: Available
name: BloodHound Enterprise - Number of critical attack paths increase
query: |
  BloodHoundEnterprise
  | where data_type == "posture"
  | where created_at > ago (7d)
  | summarize min_critical_risk_count = min(critical_risk_count), arg_max(created_at, current_critical_risk_count = critical_risk_count) by domain_name
  | extend  difference = current_critical_risk_count - min_critical_risk_count
  | where difference > 0  
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2023-02-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/df292d06-f348-41ad-b780-0abb5acfe9ab')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/df292d06-f348-41ad-b780-0abb5acfe9ab')]",
      "properties": {
        "alertRuleTemplateName": "df292d06-f348-41ad-b780-0abb5acfe9ab",
        "customDetails": null,
        "description": "'The number of critical attack paths has increased over the past 7 days.'\n",
        "displayName": "BloodHound Enterprise - Number of critical attack paths increase",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "DNS",
            "fieldMappings": [
              {
                "displayName": "domain_name",
                "identifier": "DomainName"
              }
            ]
          }
        ],
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/BloodHound Enterprise/Analytic Rules/BloodHoundEnterpriseCriticalAttackPaths.yaml",
        "query": "BloodHoundEnterprise\n| where data_type == \"posture\"\n| where created_at > ago (7d)\n| summarize min_critical_risk_count = min(critical_risk_count), arg_max(created_at, current_critical_risk_count = critical_risk_count) by domain_name\n| extend  difference = current_critical_risk_count - min_critical_risk_count\n| where difference > 0\n",
        "queryFrequency": "P7D",
        "queryPeriod": "P7D",
        "severity": "Medium",
        "status": "Available",
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [],
        "techniques": [],
        "templateVersion": "1.0.1",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}