Mimecast Audit - Logon Authentication Failed
| Id | f00197ab-491f-41e7-9e22-a7003a4c1e54 |
| Rulename | Mimecast Audit - Logon Authentication Failed |
| Description | Detects threat when logon authentication failure found in audit |
| Severity | High |
| Tactics | Discovery InitialAccess CredentialAccess |
| Techniques | T1110 |
| Required data connectors | MimecastAuditAPI |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 3 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastAudit/Mimecast_Audit.yaml |
| Version | 1.0.1 |
| Arm template | f00197ab-491f-41e7-9e22-a7003a4c1e54.json |
MimecastAudit
| where ['Source IP'] !="" and ['Audit Type'] == "Logon Authentication Failed"
| extend SourceIp = ['Source IP']
description: Detects threat when logon authentication failure found in audit
version: 1.0.1
enabled: true
triggerThreshold: 3
tactics:
- Discovery
- InitialAccess
- CredentialAccess
alertRuleTemplateName:
suppressionEnabled: false
suppressionDuration: 5h
queryPeriod: 30m
kind: Scheduled
entityMappings:
- fieldMappings:
- columnName: SourceIp
identifier: Address
entityType: IP
- fieldMappings:
- columnName: User
identifier: MailboxPrimaryAddress
entityType: Mailbox
- fieldMappings:
- columnName: Application
identifier: AppId
entityType: CloudApplication
query: |
MimecastAudit
| where ['Source IP'] !="" and ['Audit Type'] == "Logon Authentication Failed"
| extend SourceIp = ['Source IP']
alertDetailsOverride:
eventGroupingSettings:
aggregationKind: SingleAlert
id: f00197ab-491f-41e7-9e22-a7003a4c1e54
displayName: Mimecast Audit - Logon Authentication Failed
name: Mimecast Audit - Logon Authentication Failed
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Mimecast/Analytic Rules/MimecastAudit/Mimecast_Audit.yaml
queryFrequency: 30m
severity: High
incidentConfiguration:
createIncident: true
groupingConfiguration:
reopenClosedIncident: false
lookbackDuration: P7D
enabled: true
matchingMethod: AllEntities
triggerOperator: gt
customDetails:
relevantTechniques:
- T1110
requiredDataConnectors:
- dataTypes:
- MimecastAudit
connectorId: MimecastAuditAPI