VectraDetections
| where Type == "host"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
suppressionEnabled: false
incidentConfiguration:
createIncident: false
groupingConfiguration:
matchingMethod: AllEntities
lookbackDuration: PT5H
enabled: false
reopenClosedIncident: false
suppressionDuration: PT1H
customDetails:
entity_id: entity_id
tags: tags
detection_id: detection_id
entity_type: entity_type
mitre_techniques: mitre
queryPeriod: 10m
tactics:
- Persistence
triggerOperator: GreaterThan
version: 1.0.1
name: Vectra Create Detection Alert for Hosts
severity: Medium
id: fb861539-da19-4266-831f-99459b8e7605
entityMappings:
- entityType: Host
fieldMappings:
- columnName: entity_uid
identifier: HostName
alertDetailsOverride:
alertDynamicProperties:
- alertProperty: AlertLink
value: detection_url
alertDescriptionFormat: Vectra AI has detected {{category}} - {{detection}} on entity {{entity_uid}}.
alertDisplayNameFormat: Vectra AI Detection- {{detection}}
relevantTechniques:
- T1546
requiredDataConnectors:
- connectorId: VectraXDR
dataTypes:
- Detections_Data_CL
kind: Scheduled
status: Available
eventGroupingSettings:
aggregationKind: AlertPerResult
queryFrequency: 10m
triggerThreshold: 0
description: This analytic rule is looking for new attacker behaviors observed by the Vectra Platform. The intent is to create entries in the SecurityAlert table for every new detection attached to an entity monitored by the Vectra Platform
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Detection_Host.yaml
query: |
VectraDetections
| where Type == "host"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid