VectraDetections
| where Type == "account"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
eventGroupingSettings:
aggregationKind: AlertPerResult
suppressionEnabled: false
incidentConfiguration:
groupingConfiguration:
enabled: false
matchingMethod: AllEntities
lookbackDuration: PT5H
reopenClosedIncident: false
createIncident: false
queryPeriod: 10m
name: Vectra Create Detection Alert for Accounts
status: Available
customDetails:
detection_id: detection_id
entity_id: entity_id
mitre_techniques: mitre
entity_type: entity_type
tags: tags
entityMappings:
- fieldMappings:
- columnName: entity_uid
identifier: Name
entityType: Account
alertDetailsOverride:
alertDescriptionFormat: Vectra AI has detected {{category}} - {{detection} on entity {{entity_uid}}.
alertDynamicProperties:
- value: detection_url
alertProperty: AlertLink
alertDisplayNameFormat: Vectra AI Detection- {{detection}}
version: 1.0.1
description: This analytic rule is looking for new attacker behaviors observed by the Vectra Platform. The intent is to create entries in the SecurityAlert table for every new detection attached to an entity monitored by the Vectra Platform
severity: Medium
requiredDataConnectors:
- connectorId: VectraXDR
dataTypes:
- Detections_Data_CL
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Detection_Account.yaml
tactics:
- Persistence
suppressionDuration: PT1H
queryFrequency: 10m
id: e796701f-6b39-4c54-bf8a-1d543a990784
triggerThreshold: 0
query: |
VectraDetections
| where Type == "account"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
relevantTechniques:
- T1546
kind: Scheduled
triggerOperator: GreaterThan