Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

blacklens Insights

Back
Ide261b70a-3005-4a1b-a7a2-2c8147fafed7
Rulenameblacklens Insights
DescriptionCreates incidents from blacklens.io Attack Surface Management alerts ingested into the blacklens_CL table. Alert severity is mapped dynamically from the source data.
SeverityHigh
TacticsReconnaissance
ResourceDevelopment
InitialAccess
CredentialAccess
Collection
Exfiltration
DefenseEvasion
CommandAndControl
TechniquesT1595
T1583
T1190
T1110
T1005
T1041
T1562
T1071
Required data connectorsblacklens_io
KindNRT
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Blacklens/Analytic Rules/blacklensInsights.yaml
Version1.0.0
Arm templatee261b70a-3005-4a1b-a7a2-2c8147fafed7.json
Deploy To Azure
blacklens_CL
| summarize arg_max(TimeGenerated, *) by id
| extend AlertSeverity = case(
    tolower(severity) == "critical", "High",
    tolower(severity) == "high", "High",
    tolower(severity) == "medium", "Medium",
    tolower(severity) == "low", "Low",
    "Informational"
)
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Blacklens/Analytic Rules/blacklensInsights.yaml
eventGroupingSettings:
  aggregationKind: AlertPerResult
description: |
    'Creates incidents from blacklens.io Attack Surface Management alerts ingested into the blacklens_CL table. Alert severity is mapped dynamically from the source data.'
suppressionEnabled: false
name: blacklens Insights
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: false
    reopenClosedIncident: false
    lookbackDuration: PT5H
kind: NRT
requiredDataConnectors:
- connectorId: blacklens_io
  dataTypes:
  - blacklens_CL
suppressionDuration: PT1H
entityMappings:
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: link
tactics:
- Reconnaissance
- ResourceDevelopment
- InitialAccess
- CredentialAccess
- Collection
- Exfiltration
- DefenseEvasion
- CommandAndControl
id: e261b70a-3005-4a1b-a7a2-2c8147fafed7
status: Available
version: 1.0.0
query: |
  blacklens_CL
  | summarize arg_max(TimeGenerated, *) by id
  | extend AlertSeverity = case(
      tolower(severity) == "critical", "High",
      tolower(severity) == "high", "High",
      tolower(severity) == "medium", "Medium",
      tolower(severity) == "low", "Low",
      "Informational"
  )  
alertDetailsOverride:
  alertDescriptionFormat: '{{message}}'
  alertDisplayNameFormat: '{{alert_title}}'
  alertSeverityColumnName: AlertSeverity
severity: High
relevantTechniques:
- T1595
- T1583
- T1190
- T1110
- T1005
- T1041
- T1562
- T1071