VectraDetections
| where Type == "account"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
queryFrequency: 10m
entityMappings:
- entityType: Account
fieldMappings:
- columnName: entity_uid
identifier: Name
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.0.1
id: e796701f-6b39-4c54-bf8a-1d543a990784
suppressionEnabled: false
severity: Medium
kind: Scheduled
suppressionDuration: PT1H
description: This analytic rule is looking for new attacker behaviors observed by the Vectra Platform. The intent is to create entries in the SecurityAlert table for every new detection attached to an entity monitored by the Vectra Platform
relevantTechniques:
- T1546
requiredDataConnectors:
- connectorId: VectraXDR
dataTypes:
- Detections_Data_CL
triggerOperator: GreaterThan
name: Vectra Create Detection Alert for Accounts
tactics:
- Persistence
alertDetailsOverride:
alertDescriptionFormat: Vectra AI has detected {{category}} - {{detection} on entity {{entity_uid}}.
alertDynamicProperties:
- value: detection_url
alertProperty: AlertLink
alertDisplayNameFormat: Vectra AI Detection- {{detection}}
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Detection_Account.yaml
triggerThreshold: 0
queryPeriod: 10m
query: |
VectraDetections
| where Type == "account"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
status: Available
customDetails:
entity_type: entity_type
entity_id: entity_id
tags: tags
mitre_techniques: mitre
detection_id: detection_id
incidentConfiguration:
createIncident: false
groupingConfiguration:
lookbackDuration: PT5H
enabled: false
reopenClosedIncident: false
matchingMethod: AllEntities