VectraDetections
| where Type == "host"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
alertDetailsOverride:
alertDescriptionFormat: Vectra AI has detected {{category}} - {{detection}} on entity {{entity_uid}}.
alertDynamicProperties:
- alertProperty: AlertLink
value: detection_url
alertDisplayNameFormat: Vectra AI Detection- {{detection}}
relevantTechniques:
- T1546
name: Vectra Create Detection Alert for Hosts
queryFrequency: 10m
tactics:
- Persistence
triggerThreshold: 0
severity: Medium
requiredDataConnectors:
- connectorId: VectraXDR
dataTypes:
- Detections_Data_CL
suppressionDuration: PT1H
query: |
VectraDetections
| where Type == "host"
| extend
entity_uid = ['Entity UID'],
entity_id = ['Entity ID'],
entity_type = ['Entity Type'],
detection_id = ['Detection ID'],
detection = ['Detection Name'],
category = ['Detection Category'],
detection_url = ['Vectra Pivot'],
mitre = Mitre,
tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.0.1
kind: Scheduled
entityMappings:
- fieldMappings:
- columnName: entity_uid
identifier: HostName
entityType: Host
queryPeriod: 10m
triggerOperator: GreaterThan
customDetails:
mitre_techniques: mitre
tags: tags
detection_id: detection_id
entity_id: entity_id
entity_type: entity_type
suppressionEnabled: false
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
enabled: false
lookbackDuration: PT5H
matchingMethod: AllEntities
createIncident: false
id: fb861539-da19-4266-831f-99459b8e7605
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Detection_Host.yaml
status: Available
description: This analytic rule is looking for new attacker behaviors observed by the Vectra Platform. The intent is to create entries in the SecurityAlert table for every new detection attached to an entity monitored by the Vectra Platform