Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Mimecast Audit - Logon Authentication Failed

Back
Idf00197ab-491f-41e7-9e22-a7003a4c1e54
RulenameMimecast Audit - Logon Authentication Failed
DescriptionDetects threat when logon authentication failure found in audit
SeverityHigh
TacticsDiscovery
InitialAccess
CredentialAccess
TechniquesT1110
Required data connectorsMimecastAuditAPI
KindScheduled
Query frequency30m
Query period30m
Trigger threshold3
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastAudit/Mimecast_Audit.yaml
Version1.0.1
Arm templatef00197ab-491f-41e7-9e22-a7003a4c1e54.json
Deploy To Azure
MimecastAudit 
| where ['Source IP'] !="" and ['Audit Type'] == "Logon Authentication Failed"
| extend   SourceIp = ['Source IP'] 
requiredDataConnectors:
- dataTypes:
  - MimecastAudit
  connectorId: MimecastAuditAPI
queryPeriod: 30m
triggerThreshold: 3
queryFrequency: 30m
suppressionDuration: 5h
severity: High
eventGroupingSettings:
  aggregationKind: SingleAlert
enabled: true
alertRuleTemplateName: 
description: Detects threat when logon authentication failure found in audit
name: Mimecast Audit - Logon Authentication Failed
kind: Scheduled
version: 1.0.1
entityMappings:
- fieldMappings:
  - identifier: Address
    columnName: SourceIp
  entityType: IP
- fieldMappings:
  - identifier: MailboxPrimaryAddress
    columnName: User
  entityType: Mailbox
- fieldMappings:
  - identifier: AppId
    columnName: Application
  entityType: CloudApplication
triggerOperator: gt
id: f00197ab-491f-41e7-9e22-a7003a4c1e54
displayName: Mimecast Audit - Logon Authentication Failed
tactics:
- Discovery
- InitialAccess
- CredentialAccess
relevantTechniques:
- T1110
customDetails: 
suppressionEnabled: false
alertDetailsOverride: 
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastAudit/Mimecast_Audit.yaml
query: |
  MimecastAudit 
  | where ['Source IP'] !="" and ['Audit Type'] == "Logon Authentication Failed"
  | extend   SourceIp = ['Source IP']   
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: P7D
    matchingMethod: AllEntities
    enabled: true
    reopenClosedIncident: false