Medium severity malicious activity detected
| Id | dfbe3963-42fb-4ebe-a00c-1cc44e2aa9f0 |
| Rulename | Medium severity malicious activity detected |
| Description | Identifies medium severity malicious activity in Azure Firewall IDPS logs. |
| Severity | Medium |
| Tactics | InitialAccess Execution DefenseEvasion Impact |
| Techniques | T1496 T1204 T1036 |
| Required data connectors | AzureFirewall |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 24h |
| Trigger threshold | 1 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Azure Firewall/Analytic Rules/Azure Firewall - Medium severity malicious activity detected.yaml |
| Version | 1.0.0 |
| Arm template | dfbe3963-42fb-4ebe-a00c-1cc44e2aa9f0.json |
let TimeWindow = 90d;
let HitThreshold = 10;
let MinSeverity = 2;
let EnableCategoryFilter = true;
let EnableDescriptionFilter = false;
let EnableActionFilter = false;
let CategoriesOfInterest = dynamic([
"Possibly Unwanted Program Detected",
"Possible Social Engineering Attempted",
"Crypto Currency Mining Activity Detected",
"A suspicious filename was detected",
"A system call was detected"
]);
let DescriptionsOfInterest = dynamic([
"pup-activity",
"social-engineering",
"coin-mining",
"suspicious-filename-detect",
"system-call-detect"
]);
let MatchActions = dynamic(["Deny", "alert"]);
AZFWIdpsSignature
| where TimeGenerated >= ago(TimeWindow)
| where Severity >= MinSeverity
| where (EnableCategoryFilter == false) or (Category has_any (CategoriesOfInterest))
| where (EnableDescriptionFilter == false) or (Description has_any (DescriptionsOfInterest))
| where (EnableActionFilter == false) or (Action in~ (MatchActions))
| summarize
StartTime = min(TimeGenerated),
EndTime = max(TimeGenerated),
TotalHits = count(),
MaxSeverity = max(Severity),
Actions = make_set(Action, 5),
Signatures = make_set(SignatureId, 20),
Description = make_set(substring(tostring(Description), 0, 120), 3)
by SourceIp, ThreatCategory = Category
| where TotalHits >= HitThreshold
| project
StartTime,
EndTime,
SourceIp,
ThreatCategory,
TotalHits,
MaxSeverity,
Actions,
Signatures,
Description
| order by MaxSeverity desc, TotalHits desc
name: Medium severity malicious activity detected
relevantTechniques:
- T1496
- T1204
- T1036
id: dfbe3963-42fb-4ebe-a00c-1cc44e2aa9f0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Azure Firewall/Analytic Rules/Azure Firewall - Medium severity malicious activity detected.yaml
requiredDataConnectors:
- dataTypes:
- AZFWIdpsSignature
connectorId: AzureFirewall
version: 1.0.0
severity: Medium
triggerThreshold: 1
queryPeriod: 24h
entityMappings:
- fieldMappings:
- identifier: Address
columnName: SourceIp
entityType: IP
queryFrequency: 1h
status: Available
query: |
let TimeWindow = 90d;
let HitThreshold = 10;
let MinSeverity = 2;
let EnableCategoryFilter = true;
let EnableDescriptionFilter = false;
let EnableActionFilter = false;
let CategoriesOfInterest = dynamic([
"Possibly Unwanted Program Detected",
"Possible Social Engineering Attempted",
"Crypto Currency Mining Activity Detected",
"A suspicious filename was detected",
"A system call was detected"
]);
let DescriptionsOfInterest = dynamic([
"pup-activity",
"social-engineering",
"coin-mining",
"suspicious-filename-detect",
"system-call-detect"
]);
let MatchActions = dynamic(["Deny", "alert"]);
AZFWIdpsSignature
| where TimeGenerated >= ago(TimeWindow)
| where Severity >= MinSeverity
| where (EnableCategoryFilter == false) or (Category has_any (CategoriesOfInterest))
| where (EnableDescriptionFilter == false) or (Description has_any (DescriptionsOfInterest))
| where (EnableActionFilter == false) or (Action in~ (MatchActions))
| summarize
StartTime = min(TimeGenerated),
EndTime = max(TimeGenerated),
TotalHits = count(),
MaxSeverity = max(Severity),
Actions = make_set(Action, 5),
Signatures = make_set(SignatureId, 20),
Description = make_set(substring(tostring(Description), 0, 120), 3)
by SourceIp, ThreatCategory = Category
| where TotalHits >= HitThreshold
| project
StartTime,
EndTime,
SourceIp,
ThreatCategory,
TotalHits,
MaxSeverity,
Actions,
Signatures,
Description
| order by MaxSeverity desc, TotalHits desc
tactics:
- InitialAccess
- Execution
- DefenseEvasion
- Impact
kind: Scheduled
description: |
Identifies medium severity malicious activity in Azure Firewall IDPS logs.
triggerOperator: gt