Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

GWorkspace - Alert events

Back
Ide369d246-5da8-11ec-bf63-0242ac130002
RulenameGWorkspace - Alert events
DescriptionDetects alert events.
SeverityHigh
TacticsInitialAccess
TechniquesT1190
T1133
Required data connectorsGoogleWorkspaceReportsAPI
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Analytic Rules/GWorkspaceAlertEvents.yaml
Version1.0.1
Arm templatee369d246-5da8-11ec-bf63-0242ac130002.json
Deploy To Azure
GWorkspaceActivityReports
| where EventType has "ALERT_CENTER"
| extend AccountCustomEntity = ActorEmail
description: |
    'Detects alert events.'
version: 1.0.1
triggerThreshold: 0
tactics:
- InitialAccess
queryPeriod: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Analytic Rules/GWorkspaceAlertEvents.yaml
triggerOperator: gt
status: Available
id: e369d246-5da8-11ec-bf63-0242ac130002
name: GWorkspace - Alert events
queryFrequency: 1h
severity: High
kind: Scheduled
entityMappings:
- fieldMappings:
  - columnName: AccountCustomEntity
    identifier: Name
  entityType: Account
relevantTechniques:
- T1190
- T1133
query: |
  GWorkspaceActivityReports
  | where EventType has "ALERT_CENTER"
  | extend AccountCustomEntity = ActorEmail  
requiredDataConnectors:
- dataTypes:
  - GWorkspaceActivityReports
  connectorId: GoogleWorkspaceReportsAPI