Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Radiflow - Platform Alert

Back
Idff0c781a-b30f-4acf-9cf1-75d7383d66d1
RulenameRadiflow - Platform Alert
DescriptionGenerates an incident when an alert raised by Radiflow’s iSID is not contemplated by any of the other analytic rules
SeverityMedium
TacticsPrivilegeEscalation
Execution
CommandAndControl
Exfiltration
LateralMovement
ImpairProcessControl
InhibitResponseFunction
InitialAccess
Required data connectorsRadiflowIsid
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Radiflow/Analytic Rules/RadiflowPlatformAlert.yaml
Version1.0.0
Arm templateff0c781a-b30f-4acf-9cf1-75d7383d66d1.json
Deploy To Azure
RadiflowEvent
| where DeviceProduct =~ 'iSID'
| where EventClassID !in ('User Activity', 100, 200, 300, 15500, 500, 15600, 16100, 16900, 17100, 18200, 18300, 18400, 18500, 5200, 10500, 15000, 15100, 15200, 15300, 15800, 16600, 17500, 11400, 11500, 11600, 11700, 11800, 11900, 16200, 5500, 14700, 19300, 19400, 2200, 2300, 2400, 2500, 2600, 2700, 14500, 3400, 5300, 6700, 6800, 6900, 7000, 7100, 17900, 5700, 5800, 5800, 6000, 17600, 17800, 18100)
suppressionDuration: 5h
name: Radiflow - Platform Alert
severity: Medium
suppressionEnabled: false
description: Generates an incident when an alert raised by Radiflow's iSID is not contemplated by any of the other analytic rules
version: 1.0.0
customDetails:
  SourceIP: SourceIP
  SourceType: SourceType
  DestinationHostName: DestinationHostName
  SourceVLAN: SourceVLAN
  DestinationVendor: DestinationVendor
  SourceMAC: SourceMACAddress
  DestinationType: DestinationType
  DestinationIP: DestinationIP
  Protocol: Protocol
  DestinationMAC: DestinationMACAddress
  SourceVendor: SourceVendor
  SourceHostName: SourceHostName
  Port: Port
requiredDataConnectors:
- dataTypes:
  - RadiflowEvent
  connectorId: RadiflowIsid
tactics:
- PrivilegeEscalation
- Execution
- CommandAndControl
- Exfiltration
- LateralMovement
- ImpairProcessControl
- InhibitResponseFunction
- InitialAccess
relevantTechniques: 
entityMappings:
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: SourceHostName
  - identifier: NetBiosName
    columnName: SourceHostName
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: DestinationHostName
  - identifier: NetBiosName
    columnName: DestinationHostName
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: SourceIP
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: DestinationIP
kind: Scheduled
triggerThreshold: 0
status: Available
queryPeriod: 1h
incidentConfiguration:
  groupingConfiguration:
    matchingMethod: AllEntities
    lookbackDuration: 1h
    enabled: true
    reopenClosedIncident: false
    groupByEntities: []
    groupByAlertDetails: []
    groupByCustomDetails: []
  createIncident: true
alertDetailsOverride:
  alertSeverityColumnName: EventSeverity
  alertDescriptionFormat: |
        Suspicious activity has been detected by Radiflow's iSID. Please check the following details for more information.\n\nMessage: {{EventMessage}} \nSourceIP: {{SourceIP}} \nDestination IP (if any): {{DestinationIP}}
  alertDisplayNameFormat: Radiflow Platform Alert
  alertDynamicProperties: []
triggerOperator: gt
query: |
  RadiflowEvent
  | where DeviceProduct =~ 'iSID'
  | where EventClassID !in ('User Activity', 100, 200, 300, 15500, 500, 15600, 16100, 16900, 17100, 18200, 18300, 18400, 18500, 5200, 10500, 15000, 15100, 15200, 15300, 15800, 16600, 17500, 11400, 11500, 11600, 11700, 11800, 11900, 16200, 5500, 14700, 19300, 19400, 2200, 2300, 2400, 2500, 2600, 2700, 14500, 3400, 5300, 6700, 6800, 6900, 7000, 7100, 17900, 5700, 5800, 5800, 6000, 17600, 17800, 18100)  
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Radiflow/Analytic Rules/RadiflowPlatformAlert.yaml
id: ff0c781a-b30f-4acf-9cf1-75d7383d66d1