Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Vectra Create Detection Alert for Hosts

Back
Idfb861539-da19-4266-831f-99459b8e7605
RulenameVectra Create Detection Alert for Hosts
DescriptionThis analytic rule is looking for new attacker behaviors observed by the Vectra Platform. The intent is to create entries in the SecurityAlert table for every new detection attached to an entity monitored by the Vectra Platform
SeverityMedium
TacticsPersistence
TechniquesT1546
Required data connectorsVectraXDR
KindScheduled
Query frequency10m
Query period10m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Detection_Host.yaml
Version1.0.1
Arm templatefb861539-da19-4266-831f-99459b8e7605.json
Deploy To Azure
VectraDetections
| where Type == "host"
| extend
    entity_uid = ['Entity UID'],
    entity_id = ['Entity ID'],
    entity_type = ['Entity Type'],
    detection_id = ['Detection ID'],
    detection = ['Detection Name'],
    category = ['Detection Category'],
    detection_url = ['Vectra Pivot'],
    mitre = Mitre,
    tags = Tags
| summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid
suppressionEnabled: false
incidentConfiguration:
  createIncident: false
  groupingConfiguration:
    matchingMethod: AllEntities
    lookbackDuration: PT5H
    enabled: false
    reopenClosedIncident: false
suppressionDuration: PT1H
customDetails:
  entity_id: entity_id
  tags: tags
  detection_id: detection_id
  entity_type: entity_type
  mitre_techniques: mitre
queryPeriod: 10m
tactics:
- Persistence
triggerOperator: GreaterThan
version: 1.0.1
name: Vectra Create Detection Alert for Hosts
severity: Medium
id: fb861539-da19-4266-831f-99459b8e7605
entityMappings:
- entityType: Host
  fieldMappings:
  - columnName: entity_uid
    identifier: HostName
alertDetailsOverride:
  alertDynamicProperties:
  - alertProperty: AlertLink
    value: detection_url
  alertDescriptionFormat: Vectra AI has detected {{category}} - {{detection}} on entity {{entity_uid}}.
  alertDisplayNameFormat: Vectra AI Detection- {{detection}}
relevantTechniques:
- T1546
requiredDataConnectors:
- connectorId: VectraXDR
  dataTypes:
  - Detections_Data_CL
kind: Scheduled
status: Available
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryFrequency: 10m
triggerThreshold: 0
description: This analytic rule is looking for new attacker behaviors observed by the Vectra Platform. The intent is to create entries in the SecurityAlert table for every new detection attached to an entity monitored by the Vectra Platform
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra XDR/Analytic Rules/Detection_Host.yaml
query: |
  VectraDetections
  | where Type == "host"
  | extend
      entity_uid = ['Entity UID'],
      entity_id = ['Entity ID'],
      entity_type = ['Entity Type'],
      detection_id = ['Detection ID'],
      detection = ['Detection Name'],
      category = ['Detection Category'],
      detection_url = ['Vectra Pivot'],
      mitre = Mitre,
      tags = Tags
  | summarize arg_max(TimeGenerated, *) by ['Detection ID'], entity_uid