Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

GWorkspace - Alert events

Back
Ide369d246-5da8-11ec-bf63-0242ac130002
RulenameGWorkspace - Alert events
DescriptionDetects alert events.
SeverityHigh
TacticsInitialAccess
TechniquesT1190
T1133
Required data connectorsGoogleWorkspaceReportsAPI
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Analytic Rules/GWorkspaceAlertEvents.yaml
Version1.0.1
Arm templatee369d246-5da8-11ec-bf63-0242ac130002.json
Deploy To Azure
GWorkspaceActivityReports
| where EventType has "ALERT_CENTER"
| extend AccountCustomEntity = ActorEmail
description: |
    'Detects alert events.'
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Analytic Rules/GWorkspaceAlertEvents.yaml
requiredDataConnectors:
- dataTypes:
  - GWorkspaceActivityReports
  connectorId: GoogleWorkspaceReportsAPI
query: |
  GWorkspaceActivityReports
  | where EventType has "ALERT_CENTER"
  | extend AccountCustomEntity = ActorEmail  
triggerThreshold: 0
name: GWorkspace - Alert events
relevantTechniques:
- T1190
- T1133
entityMappings:
- entityType: Account
  fieldMappings:
  - columnName: AccountCustomEntity
    identifier: Name
tactics:
- InitialAccess
queryPeriod: 1h
severity: High
status: Available
queryFrequency: 1h
id: e369d246-5da8-11ec-bf63-0242ac130002
kind: Scheduled
version: 1.0.1
triggerOperator: gt