Illumio Firewall Tampering Analytic Rule
| Id | e9e4e466-3970-4165-bc8d-7721c6ef34a6 |
| Rulename | Illumio Firewall Tampering Analytic Rule |
| Description | Create Microsoft Sentinel Incident When Firewall Is Tampered With |
| Severity | Medium |
| Tactics | DefenseEvasion |
| Techniques | T1562 |
| Required data connectors | IllumioSaaSDataConnector SyslogAma |
| Kind | Scheduled |
| Query frequency | 60m |
| Query period | 60m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/IllumioSaaS/Analytic Rules/Illumio_VEN_Firewall_Tampering_Detection_Query.yaml |
| Version | 1.0.7 |
| Arm template | e9e4e466-3970-4165-bc8d-7721c6ef34a6.json |
Illumio_Auditable_Events_CL
| union IllumioSyslogAuditEvents
| where event_type has 'tampering'
| extend ipaddress = action.src_ip,
hostname = created_by.agent.hostname,
ven_href = created_by.ven.href
| project-away resource_changes, action, version
alertDetailsOverride:
alertDescriptionFormat: |
Illumio Firewall Tamper Incident for {{hostname}} generated at {{TimeGenerated}}
alertDisplayNameFormat: |
Illumio Firewall Tamper Incident for {{hostname}}
query: |
Illumio_Auditable_Events_CL
| union IllumioSyslogAuditEvents
| where event_type has 'tampering'
| extend ipaddress = action.src_ip,
hostname = created_by.agent.hostname,
ven_href = created_by.ven.href
| project-away resource_changes, action, version
triggerThreshold: 0
status: Available
version: 1.0.7
requiredDataConnectors:
- dataTypes:
- Illumio_Auditable_Events_CL
connectorId: IllumioSaaSDataConnector
- datatypes:
- Syslog
connectorId: SyslogAma
relevantTechniques:
- T1562
queryFrequency: 60m
triggerOperator: gt
kind: Scheduled
eventGroupingSettings:
aggregationKind: SingleAlert
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: hostname
- entityType: IP
fieldMappings:
- identifier: Address
columnName: ipaddress
description: |
'Create Microsoft Sentinel Incident When Firewall Is Tampered With'
severity: Medium
tactics:
- DefenseEvasion
name: Illumio Firewall Tampering Analytic Rule
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/IllumioSaaS/Analytic Rules/Illumio_VEN_Firewall_Tampering_Detection_Query.yaml
id: e9e4e466-3970-4165-bc8d-7721c6ef34a6
queryPeriod: 60m