Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Successful logins to SOC Prime platform from bad IP addresses

Back
Idf8e7d6c5-b4a3-4122-8110-0987654321fe
RulenameSuccessful logins to SOC Prime platform from bad IP addresses
DescriptionThis rule identifies successful logins from IP addresses previously flagged as malicious (e.g., botnets, TOR exit nodes, or known malicious IPs)
SeverityMedium
TacticsInitialAccess
TechniquesT1078
Required data connectorsSOCPrimeAuditLogsDataConnector
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SOC Prime CCF/Analytic Rules/SuccessLoginFromBadIp.yaml
Version1.0.0
Arm templatef8e7d6c5-b4a3-4122-8110-0987654321fe.json
Deploy To Azure
let blacklistIPs = _GetWatchlist('blacklistOfIps')
| project IPAddress = column_ifexists('ip','IPAddress');
SOCPrimeAuditLogs_CL
| where EventName == "Logged in to the SOC Prime Platform"
| where SourceIp in (blacklistIPs)
| project TimeGenerated, EventName, UserEmail, UserName, SourceIp, Uri, Type
status: Available
relevantTechniques:
- T1078
triggerThreshold: 0
severity: Medium
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SOC Prime CCF/Analytic Rules/SuccessLoginFromBadIp.yaml
queryPeriod: 1h
query: |
  let blacklistIPs = _GetWatchlist('blacklistOfIps')
  | project IPAddress = column_ifexists('ip','IPAddress');
  SOCPrimeAuditLogs_CL
  | where EventName == "Logged in to the SOC Prime Platform"
  | where SourceIp in (blacklistIPs)
  | project TimeGenerated, EventName, UserEmail, UserName, SourceIp, Uri, Type  
id: f8e7d6c5-b4a3-4122-8110-0987654321fe
entityMappings:
- fieldMappings:
  - columnName: UserName
    identifier: Name
  entityType: Account
- fieldMappings:
  - columnName: SourceIp
    identifier: Address
  entityType: IP
name: Successful logins to SOC Prime platform from bad IP addresses
kind: Scheduled
description: |
    'This rule identifies successful logins from IP addresses previously flagged as malicious (e.g., botnets, TOR exit nodes, or known malicious IPs)'
tactics:
- InitialAccess
version: 1.0.0
triggerOperator: gt
queryFrequency: 1h
requiredDataConnectors:
- connectorId: SOCPrimeAuditLogsDataConnector
  dataTypes:
  - SOCPrimeAuditLogs_CL