Illumio Firewall Tampering Analytic Rule
| Id | e9e4e466-3970-4165-bc8d-7721c6ef34a6 |
| Rulename | Illumio Firewall Tampering Analytic Rule |
| Description | Create Microsoft Sentinel Incident When Firewall Is Tampered With |
| Severity | Medium |
| Tactics | DefenseEvasion |
| Techniques | T1562 |
| Required data connectors | IllumioSaaSDataConnector SyslogAma |
| Kind | Scheduled |
| Query frequency | 60m |
| Query period | 60m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/IllumioSaaS/Analytic Rules/Illumio_VEN_Firewall_Tampering_Detection_Query.yaml |
| Version | 1.0.7 |
| Arm template | e9e4e466-3970-4165-bc8d-7721c6ef34a6.json |
Illumio_Auditable_Events_CL
| union IllumioSyslogAuditEvents
| where event_type has 'tampering'
| extend ipaddress = action.src_ip,
hostname = created_by.agent.hostname,
ven_href = created_by.ven.href
| project-away resource_changes, action, version
name: Illumio Firewall Tampering Analytic Rule
relevantTechniques:
- T1562
id: e9e4e466-3970-4165-bc8d-7721c6ef34a6
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/IllumioSaaS/Analytic Rules/Illumio_VEN_Firewall_Tampering_Detection_Query.yaml
requiredDataConnectors:
- dataTypes:
- Illumio_Auditable_Events_CL
connectorId: IllumioSaaSDataConnector
- datatypes:
- Syslog
connectorId: SyslogAma
eventGroupingSettings:
aggregationKind: SingleAlert
version: 1.0.7
severity: Medium
triggerThreshold: 0
queryPeriod: 60m
entityMappings:
- fieldMappings:
- identifier: HostName
columnName: hostname
entityType: Host
- fieldMappings:
- identifier: Address
columnName: ipaddress
entityType: IP
alertDetailsOverride:
alertDisplayNameFormat: |
Illumio Firewall Tamper Incident for {{hostname}}
alertDescriptionFormat: |
Illumio Firewall Tamper Incident for {{hostname}} generated at {{TimeGenerated}}
queryFrequency: 60m
status: Available
query: |
Illumio_Auditable_Events_CL
| union IllumioSyslogAuditEvents
| where event_type has 'tampering'
| extend ipaddress = action.src_ip,
hostname = created_by.agent.hostname,
ven_href = created_by.ven.href
| project-away resource_changes, action, version
tactics:
- DefenseEvasion
kind: Scheduled
description: |
'Create Microsoft Sentinel Incident When Firewall Is Tampered With'
triggerOperator: gt