VectraDetections
| where Type == "account"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
suppressionEnabled: false
relevantTechniques:
- T1546
entityMappings:
- fieldMappings:
- columnName: entity_uid
identifier: Name
entityType: Account
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
lookbackDuration: PT5H
createIncident: false
version: 1.0.1
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Detection_Account.yaml
suppressionDuration: PT1H
description: This analytic rule is looking for new attacker behaviors observed by the Vectra Platform. The intent is to create entries in the SecurityAlert table for every new detection attached to an entity monitored by the Vectra Platform
tactics:
- Persistence
customDetails:
mitre_techniques: mitre
entity_type: entity_type
entity_id: entity_id
detection_id: detection_id
tags: tags
requiredDataConnectors:
- connectorId: VectraXDR
dataTypes:
- Detections_Data_CL
triggerOperator: GreaterThan
alertDetailsOverride:
alertDynamicProperties:
- alertProperty: AlertLink
value: detection_url
alertDisplayNameFormat: Vectra AI Detection- {{detection}}
alertDescriptionFormat: Vectra AI has detected {{category}} - {{detection} on entity {{entity_uid}}.
eventGroupingSettings:
aggregationKind: AlertPerResult
id: e796701f-6b39-4c54-bf8a-1d543a990784
queryFrequency: 10m
query: |
VectraDetections
| where Type == "account"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
severity: Medium
status: Available
queryPeriod: 10m
name: Vectra Create Detection Alert for Accounts
triggerThreshold: 0
kind: Scheduled