Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Dynatrace Application Security - Non-critical runtime vulnerability detection

Back
Idff0af873-a2f2-4233-8412-0ef4e00b0156
RulenameDynatrace Application Security - Non-critical runtime vulnerability detection
DescriptionDetect runtime vulnerabilities in your environment insights by snyk
SeverityInformational
TacticsDefenseEvasion
Execution
Impact
InitialAccess
LateralMovement
Persistence
PrivilegeEscalation
Required data connectorsDynatraceRuntimeVulnerabilities
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_NonCriticalVulnerabilityDetection.yaml
Version1.0.2
Arm templateff0af873-a2f2-4233-8412-0ef4e00b0156.json
Deploy To Azure
DynatraceSecurityProblems
| where DAVISRiskLevel != "CRITICAL"  and Muted == false
| summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
version: 1.0.2
severity: Informational
queryFrequency: 1d
customDetails:
  DAVISRiskLevel: DAVISRiskLevel
  DAVISRiskVector: DAVISRiskVector
  DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
  DAVISPublicExploit: DAVISPublicExploit
  Technology: Technology
  DAVISExposure: DAVISExposure
  DAVISRiskScore: DAVISRiskScore
  ExternVulnIdentifier: ExternalVulnerabilityId
  CVEIds: CVEIds
  SecurityProblemUrl: Url
  DisplayIdentifier: DisplayId
  PackageName: PackageName
  DAVISDataAssets: DAVISDataAssets
  SecProbIdentifier: SecurityProblemId
  VulnerabilityType: VulnerabilityType
triggerOperator: gt
alertDetailsOverride:
  alertDisplayNameFormat: 'Dynatrace Non-critical runtime vulnerability detected - {{DisplayId}} : {{Title}}'
  alertSeverityColumnName: Severity
  alertDescriptionFormat: |
        Non-critical runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
status: Available
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    lookbackDuration: PT5H
    matchingMethod: AllEntities
    enabled: false
  createIncident: false
triggerThreshold: 0
query: |
  DynatraceSecurityProblems
  | where DAVISRiskLevel != "CRITICAL"  and Muted == false
  | summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId  
queryPeriod: 1d
eventGroupingSettings:
  aggregationKind: AlertPerResult
kind: Scheduled
name: Dynatrace Application Security - Non-critical runtime vulnerability detection
requiredTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
description: Detect runtime vulnerabilities in your environment insights by snyk
requiredDataConnectors:
- dataTypes:
  - DynatraceSecurityProblems
  connectorId: DynatraceRuntimeVulnerabilities
id: ff0af873-a2f2-4233-8412-0ef4e00b0156
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_NonCriticalVulnerabilityDetection.yaml
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/ff0af873-a2f2-4233-8412-0ef4e00b0156')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/ff0af873-a2f2-4233-8412-0ef4e00b0156')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "Non-critical runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.\n",
          "alertDisplayNameFormat": "Dynatrace Non-critical runtime vulnerability detected - {{DisplayId}} : {{Title}}",
          "alertSeverityColumnName": "Severity"
        },
        "alertRuleTemplateName": "ff0af873-a2f2-4233-8412-0ef4e00b0156",
        "customDetails": {
          "CVEIds": "CVEIds",
          "DAVISDataAssets": "DAVISDataAssets",
          "DAVISExposure": "DAVISExposure",
          "DAVISPublicExploit": "DAVISPublicExploit",
          "DAVISRiskLevel": "DAVISRiskLevel",
          "DAVISRiskScore": "DAVISRiskScore",
          "DAVISRiskVector": "DAVISRiskVector",
          "DAVISVulnFuncUsage": "DAVISVulnerableFunctionUsage",
          "DisplayIdentifier": "DisplayId",
          "ExternVulnIdentifier": "ExternalVulnerabilityId",
          "PackageName": "PackageName",
          "SecProbIdentifier": "SecurityProblemId",
          "SecurityProblemUrl": "Url",
          "Technology": "Technology",
          "VulnerabilityType": "VulnerabilityType"
        },
        "description": "Detect runtime vulnerabilities in your environment insights by snyk",
        "displayName": "Dynatrace Application Security - Non-critical runtime vulnerability detection",
        "enabled": true,
        "entityMappings": null,
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "incidentConfiguration": {
          "createIncident": false,
          "groupingConfiguration": {
            "enabled": false,
            "lookbackDuration": "PT5H",
            "matchingMethod": "AllEntities",
            "reopenClosedIncident": false
          }
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_NonCriticalVulnerabilityDetection.yaml",
        "query": "DynatraceSecurityProblems\n| where DAVISRiskLevel != \"CRITICAL\"  and Muted == false\n| summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId\n",
        "queryFrequency": "P1D",
        "queryPeriod": "P1D",
        "requiredTechniques": [
          "T1140",
          "T1059",
          "T1565",
          "T1659",
          "T1210",
          "T1554",
          "T1548"
        ],
        "severity": "Informational",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [
          "DefenseEvasion",
          "Execution",
          "Impact",
          "InitialAccess",
          "LateralMovement",
          "Persistence",
          "PrivilegeEscalation"
        ],
        "templateVersion": "1.0.2",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}