Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Illumio Firewall Tampering Analytic Rule

Back
Ide9e4e466-3970-4165-bc8d-7721c6ef34a6
RulenameIllumio Firewall Tampering Analytic Rule
DescriptionCreate Microsoft Sentinel Incident When Firewall Is Tampered With
SeverityMedium
TacticsDefenseEvasion
TechniquesT1562
Required data connectorsIllumioSaaSDataConnector
SyslogAma
KindScheduled
Query frequency60m
Query period60m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/IllumioSaaS/Analytic Rules/Illumio_VEN_Firewall_Tampering_Detection_Query.yaml
Version1.0.7
Arm templatee9e4e466-3970-4165-bc8d-7721c6ef34a6.json
Deploy To Azure
Illumio_Auditable_Events_CL
 | union IllumioSyslogAuditEvents 
 | where event_type has 'tampering'
 | extend ipaddress = action.src_ip,
           hostname = created_by.agent.hostname,
           ven_href = created_by.ven.href
 | project-away resource_changes, action, version
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/IllumioSaaS/Analytic Rules/Illumio_VEN_Firewall_Tampering_Detection_Query.yaml
id: e9e4e466-3970-4165-bc8d-7721c6ef34a6
triggerThreshold: 0
triggerOperator: gt
query: |
  Illumio_Auditable_Events_CL
   | union IllumioSyslogAuditEvents 
   | where event_type has 'tampering'
   | extend ipaddress = action.src_ip,
             hostname = created_by.agent.hostname,
             ven_href = created_by.ven.href
   | project-away resource_changes, action, version  
name: Illumio Firewall Tampering Analytic Rule
kind: Scheduled
tactics:
- DefenseEvasion
requiredDataConnectors:
- connectorId: IllumioSaaSDataConnector
  dataTypes:
  - Illumio_Auditable_Events_CL
- connectorId: SyslogAma
  datatypes:
  - Syslog
relevantTechniques:
- T1562
queryFrequency: 60m
entityMappings:
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: hostname
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: ipaddress
description: |
    'Create Microsoft Sentinel Incident When Firewall Is Tampered With'
eventGroupingSettings:
  aggregationKind: SingleAlert
queryPeriod: 60m
version: 1.0.7
alertDetailsOverride:
  alertDescriptionFormat: |
        Illumio Firewall Tamper Incident for {{hostname}} generated at {{TimeGenerated}}
  alertDisplayNameFormat: |
        Illumio Firewall Tamper Incident for {{hostname}}
status: Available
severity: Medium