Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

GWorkspace - Alert events

Back
Ide369d246-5da8-11ec-bf63-0242ac130002
RulenameGWorkspace - Alert events
DescriptionDetects alert events.
SeverityHigh
TacticsInitialAccess
TechniquesT1190
T1133
Required data connectorsGoogleWorkspaceReportsAPI
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Analytic Rules/GWorkspaceAlertEvents.yaml
Version1.0.1
Arm templatee369d246-5da8-11ec-bf63-0242ac130002.json
Deploy To Azure
GWorkspaceActivityReports
| where EventType has "ALERT_CENTER"
| extend AccountCustomEntity = ActorEmail
query: |
  GWorkspaceActivityReports
  | where EventType has "ALERT_CENTER"
  | extend AccountCustomEntity = ActorEmail  
version: 1.0.1
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Analytic Rules/GWorkspaceAlertEvents.yaml
status: Available
description: |
    'Detects alert events.'
queryFrequency: 1h
name: GWorkspace - Alert events
kind: Scheduled
triggerThreshold: 0
id: e369d246-5da8-11ec-bf63-0242ac130002
requiredDataConnectors:
- connectorId: GoogleWorkspaceReportsAPI
  dataTypes:
  - GWorkspaceActivityReports
severity: High
queryPeriod: 1h
entityMappings:
- fieldMappings:
  - columnName: AccountCustomEntity
    identifier: Name
  entityType: Account
relevantTechniques:
- T1190
- T1133
tactics:
- InitialAccess