Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Dynatrace Application Security - Non-critical runtime vulnerability detection

Back
Idff0af873-a2f2-4233-8412-0ef4e00b0156
RulenameDynatrace Application Security - Non-critical runtime vulnerability detection
DescriptionDetect runtime vulnerabilities in your environment insights by snyk
SeverityInformational
TacticsDefenseEvasion
Execution
Impact
InitialAccess
LateralMovement
Persistence
PrivilegeEscalation
TechniquesT1140
T1059
T1565
T1659
T1210
T1554
T1548
Required data connectorsDynatraceRuntimeVulnerabilities
KindScheduled
Query frequency1d
Query period1d
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_NonCriticalVulnerabilityDetection.yaml
Version1.0.3
Arm templateff0af873-a2f2-4233-8412-0ef4e00b0156.json
Deploy To Azure
DynatraceSecurityProblems
| where DAVISRiskLevel != "CRITICAL"  and Muted == false
| summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
relevantTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
eventGroupingSettings:
  aggregationKind: AlertPerResult
version: 1.0.3
id: ff0af873-a2f2-4233-8412-0ef4e00b0156
severity: Informational
kind: Scheduled
queryFrequency: 1d
description: Detect runtime vulnerabilities in your environment insights by snyk
requiredDataConnectors:
- connectorId: DynatraceRuntimeVulnerabilities
  dataTypes:
  - DynatraceSecurityProblems
triggerOperator: gt
name: Dynatrace Application Security - Non-critical runtime vulnerability detection
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
alertDetailsOverride:
  alertDescriptionFormat: |
        Non-critical runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
  alertSeverityColumnName: Severity
  alertDisplayNameFormat: 'Dynatrace Non-critical runtime vulnerability detected - {{DisplayId}} : {{Title}}'
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_NonCriticalVulnerabilityDetection.yaml
triggerThreshold: 0
queryPeriod: 1d
query: |
  DynatraceSecurityProblems
  | where DAVISRiskLevel != "CRITICAL"  and Muted == false
  | summarize  arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId  
status: Available
customDetails:
  DAVISExposure: DAVISExposure
  PackageName: PackageName
  SecProbIdentifier: SecurityProblemId
  DisplayIdentifier: DisplayId
  VulnerabilityType: VulnerabilityType
  DAVISDataAssets: DAVISDataAssets
  DAVISPublicExploit: DAVISPublicExploit
  DAVISRiskVector: DAVISRiskVector
  DAVISRiskLevel: DAVISRiskLevel
  Technology: Technology
  SecurityProblemUrl: Url
  DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
  CVEIds: CVEIds
  DAVISRiskScore: DAVISRiskScore
  ExternVulnIdentifier: ExternalVulnerabilityId
incidentConfiguration:
  createIncident: false
  groupingConfiguration:
    lookbackDuration: PT5H
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities