Dynatrace Application Security - Non-critical runtime vulnerability detection
| Id | ff0af873-a2f2-4233-8412-0ef4e00b0156 |
| Rulename | Dynatrace Application Security - Non-critical runtime vulnerability detection |
| Description | Detect runtime vulnerabilities in your environment insights by snyk |
| Severity | Informational |
| Tactics | DefenseEvasion Execution Impact InitialAccess LateralMovement Persistence PrivilegeEscalation |
| Techniques | T1140 T1059 T1565 T1659 T1210 T1554 T1548 |
| Required data connectors | DynatraceRuntimeVulnerabilities |
| Kind | Scheduled |
| Query frequency | 1d |
| Query period | 1d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_NonCriticalVulnerabilityDetection.yaml |
| Version | 1.0.3 |
| Arm template | ff0af873-a2f2-4233-8412-0ef4e00b0156.json |
DynatraceSecurityProblems
| where DAVISRiskLevel != "CRITICAL" and Muted == false
| summarize arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
relevantTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
triggerOperator: gt
name: Dynatrace Application Security - Non-critical runtime vulnerability detection
id: ff0af873-a2f2-4233-8412-0ef4e00b0156
description: Detect runtime vulnerabilities in your environment insights by snyk
incidentConfiguration:
groupingConfiguration:
enabled: false
matchingMethod: AllEntities
reopenClosedIncident: false
lookbackDuration: PT5H
createIncident: false
queryFrequency: 1d
alertDetailsOverride:
alertDisplayNameFormat: 'Dynatrace Non-critical runtime vulnerability detected - {{DisplayId}} : {{Title}}'
alertSeverityColumnName: Severity
alertDescriptionFormat: |
Non-critical runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
severity: Informational
eventGroupingSettings:
aggregationKind: AlertPerResult
status: Available
query: |
DynatraceSecurityProblems
| where DAVISRiskLevel != "CRITICAL" and Muted == false
| summarize arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_NonCriticalVulnerabilityDetection.yaml
queryPeriod: 1d
triggerThreshold: 0
customDetails:
DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
DAVISRiskScore: DAVISRiskScore
DAVISRiskLevel: DAVISRiskLevel
VulnerabilityType: VulnerabilityType
Technology: Technology
SecurityProblemUrl: Url
DisplayIdentifier: DisplayId
DAVISDataAssets: DAVISDataAssets
ExternVulnIdentifier: ExternalVulnerabilityId
DAVISExposure: DAVISExposure
DAVISRiskVector: DAVISRiskVector
DAVISPublicExploit: DAVISPublicExploit
SecProbIdentifier: SecurityProblemId
CVEIds: CVEIds
PackageName: PackageName
kind: Scheduled
version: 1.0.3
requiredDataConnectors:
- dataTypes:
- DynatraceSecurityProblems
connectorId: DynatraceRuntimeVulnerabilities