Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Reconnaissance

Overview

Rule NameidRequired data connectors
API - Anomaly Detection2c59e609-e0a0-4e8e-adc5-ab4224be8a3642CrunchAPIProtection
API - API Scrapingd944d564-b6fa-470d-b5ab-41b341878c5e42CrunchAPIProtection
API - Invalid host access28500be7-cfcf-40e1-bad4-bc524e9283e242CrunchAPIProtection
API - Kiterunner detection421b38ec-4295-4aed-8299-c92e268ad66342CrunchAPIProtection
Suspicious AWS CLI Command Execution8c2dc344-9352-4ca1-8863-b1b7a5e09e59AWS
App Gateway WAF - Scanner Detection9b8dd8fd-f192-42eb-84f6-541920400a7aWAF
BitSight - diligence risk category detected161ed3ac-b242-4b13-8c6b-58716e5e9972BitSight
BitSight - drop in company ratingsd8844f11-3a36-4b97-9062-1e6d57c00e37BitSight
BitSight - drop in the headline ratingb11fdc35-6368-4cc0-8128-52cd2e2cdda0BitSight
Auto Generated Page (High)ffa30df1-7604-47c3-90f8-df81cd36abdaCBSPollingIDAzureFunctions
Auto Generated Page (Informational)c33d1539-832a-4310-bfc3-b0014e7c82bfCBSPollingIDAzureFunctions
Auto Generated Page (Medium)b5c9c09d-0bbc-4af1-b842-62f9c0f72f32CBSPollingIDAzureFunctions
Baiting News Site (High)73d7402f-fab0-4d54-a1f5-ecb87a31559cCBSPollingIDAzureFunctions
Baiting News Site (Informational)e621eb5b-2612-4c0e-84f2-036a6694d619CBSPollingIDAzureFunctions
Baiting News Site (Low)3f89fb35-5f8e-49d2-9aac-b6e21ecab1b9CBSPollingIDAzureFunctions
Baiting News Site (Medium)77c966c0-0ed4-49c2-bb52-6f0a644bcc56CBSPollingIDAzureFunctions
Dark Web (High)e5ee49ee-9a10-4e6b-a8df-d8c35209ac33CBSPollingIDAzureFunctions
Dark Web (Informational)ab55aff7-7f23-43e8-a93c-6c417647f032CBSPollingIDAzureFunctions
Dark Web (Low)5c05df18-604a-428c-b677-39305bde35a3CBSPollingIDAzureFunctions
Dark Web (Medium)7b6a3f8d-c460-44d3-adb4-16abba92aef1CBSPollingIDAzureFunctions
Domain Infringement (High)65c57477-dcc6-447f-b76d-429d2ad11cbdCBSPollingIDAzureFunctions
Domain Infringement (Informational)891724c5-8f42-41d0-aa3e-a58947cf4d3aCBSPollingIDAzureFunctions
Domain Infringement (Low)755d21cf-527f-46d3-b9c0-9005419a7eb4CBSPollingIDAzureFunctions
Domain Infringement (Medium)873f6a0f-68b7-4181-87c9-402b575458d9CBSPollingIDAzureFunctions
Domain Infringement0faddbac-0004-40fa-9046-a1ead13e005aCBSPollingIDAzureFunctions
Hacker Chatter (High)c7d8a054-015a-467f-af1e-886d99617888CBSPollingIDAzureFunctions
Hacker Chatter (Informational)603d0bc0-dfcc-480f-a7d7-66d80b7a54c1CBSPollingIDAzureFunctions
Hacker Chatter (Low)6cc71818-6cba-44cf-bf5c-4dbce1f5d21aCBSPollingIDAzureFunctions
Hacker Chatter (Medium)2463fcd3-9661-47f5-b7e4-d8e0c84783aaCBSPollingIDAzureFunctions
Header: Web Server Exposedd6793fa2-c1db-4323-9bdb-a1e8d1990f5cHVPollingIDAzureFunctions
Subdomain Infringement (High)35813b4c-b91d-4817-8838-bfbec77e27f1CBSPollingIDAzureFunctions
Subdomain Infringement (Informational)d873e524-0149-4835-ba9d-c550506d2a8dCBSPollingIDAzureFunctions
Subdomain Infringement (Low)005dd8a4-4fc0-4f8a-90f9-1423fcf5594cCBSPollingIDAzureFunctions
Subdomain Infringement (Medium)fd64c2d1-8d2b-4b70-8f95-e7b34da56830CBSPollingIDAzureFunctions
Subdomain Infringement20ffc702-b7b2-4041-8f08-10ede8906cbfCBSPollingIDAzureFunctions
CYFIRMA - Attack Surface - Weak Certificate Exposure - High Rule3b5a1c0e-7f3a-4d47-8416-6c0b8b91e9ceCyfirmaAttackSurfaceAlertsConnector
CYFIRMA - Attack Surface - Weak Certificate Exposure - Medium Rule5a617ff2-3e3d-44e7-b761-9f0d542ae191CyfirmaAttackSurfaceAlertsConnector
CYFIRMA - Attack Surface - Configuration High Rule30206b45-75d2-4c6a-87c5-f0861c1f2870CyfirmaAttackSurfaceAlertsConnector
CYFIRMA - Attack Surface - Configuration Medium Rulee1f88d08-5c32-4d35-a8ce-2f21cdb4b6deCyfirmaAttackSurfaceAlertsConnector
CYFIRMA - Attack Surface - Malicious Domain/IP Reputation High Rule7ff6f6d7-9672-4567-99fc-cb8a58c3bce7CyfirmaAttackSurfaceAlertsConnector
CYFIRMA - Attack Surface - Malicious Domain/IP Reputation Medium Rule70f137e4-e4ef-4635-92de-10c4f5b0fcd0CyfirmaAttackSurfaceAlertsConnector
CYFIRMA - Brand Intelligence - Executive/People Impersonation High Rule159d26a1-591c-4f70-b1ca-2843c881aaecCyfirmaBrandIntelligenceAlertsDC
CYFIRMA - Brand Intelligence - Executive/People Impersonation Medium Rule59aa22f2-5b4f-4679-b289-003228255413CyfirmaBrandIntelligenceAlertsDC
CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected High Rule22f49d67-7da7-4809-8d07-89e4478aa6b0CyfirmaBrandIntelligenceAlertsDC
CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected Medium Rule710f4755-490d-4fa7-aef0-43b5a66edc7bCyfirmaBrandIntelligenceAlertsDC
CYFIRMA - High severity Malicious Network Indicators with Block Action Rule58ae2c87-fc07-434b-aacf-f66d25b25e7eCyfirmaCyberIntelligenceDC
CYFIRMA - Medium severity Malicious Network Indicators with Block Action Rule4e7d1851-5aab-478d-b348-4b83dc2b03d9CyfirmaCyberIntelligenceDC
CYFIRMA - High severity Malicious Network Indicators with Monitor Action Rule8317de44-09e4-4a04-8fae-c38c1b72064bCyfirmaCyberIntelligenceDC
CYFIRMA - Medium severity Malicious Network Indicators with Monitor Action Rule52c2f8d4-1dc8-4141-9152-614c036390a0CyfirmaCyberIntelligenceDC
CYFIRMA - High severity TOR Node Network Indicators - Block Recommended Rulefa53ac37-a646-4106-91b6-ce478a1b5323CyfirmaCyberIntelligenceDC
CYFIRMA - Medium severity TOR Node Network Indicators - Block Recommended Ruleaba36dc3-af43-4ab6-9349-3d1e37f1d4f3CyfirmaCyberIntelligenceDC
CYFIRMA - High severity TOR Node Network Indicators - Monitor Recommended Rule6f107cf8-02f9-4440-b5d8-1235293e5ad7CyfirmaCyberIntelligenceDC
CYFIRMA - Medium severity TOR Node Network Indicators - Monitor Recommended Rulee41b7640-9ba6-42d6-a4c9-1ab6932a0b14CyfirmaCyberIntelligenceDC
CYFIRMA - Social and Public Exposure - Confidential Files Information Exposure Rule67e9c4aa-a2fa-4e4e-9272-1a8da41475c6CyfirmaDigitalRiskAlertsConnector
CYFIRMA - Social and Public Exposure - Confidential Files Information Exposure Rulea2984be5-8d69-4139-b98f-e89c9c421c27CyfirmaDigitalRiskAlertsConnector
CYFIRMA - Social and Public Exposure - Social Media Threats Activity Detected Rule4fe04459-13f1-4ff7-9b7c-f9be0c2aad6dCyfirmaDigitalRiskAlertsConnector
CYFIRMA - Social and Public Exposure - Social Media Threats Activity Detected Ruleb8149f2f-54da-4f7b-98e1-c01ca47e1e55CyfirmaDigitalRiskAlertsConnector
Rare client observed with high reverse DNS lookup count - Anomaly based (ASIM DNS Solution)0fe6bde4-b215-480c-99b4-84a96edcdbd7
Rare client observed with high reverse DNS lookup count - Static threshold based (ASIM DNS Solution)77b7c820-5f60-4779-8bdb-f06e21add5f1
Flare Cloud bucket result9cb7c337-f172-4af6-b0e8-b6b7552d762dFlare
Flare Darkweb result9cb7c337-f173-4af6-b0e8-b6b7552d762dFlare
Flare Google Dork result found9cb7c337-f174-4af6-b0e8-b6b7552d762dFlare
Flare Host result9cb7c337-f175-4af6-b0e8-b6b7552d762dFlare
Flare Paste result9cb7c337-f177-4af6-b0e8-b6b7552d762dFlare
Flare Source Code found9cb7c337-f178-4af6-b0e8-b6b7552d762dFlare
Dataverse - Suspicious use of Web API8a6ecba2-ccfe-4c8c-b086-fa3e6ff7fa86Dataverse
AzureActiveDirectory
Network Port Sweep from External Network (ASIM Network Session schema)cd8faa84-4464-4b4e-96dc-b22f50c27541AWSS3
MicrosoftThreatProtection
SecurityEvents
WindowsSecurityEvents
WindowsForwardedEvents
Zscaler
MicrosoftSysmonForLinux
PaloAltoNetworks
AzureMonitor(VMInsights)
AzureFirewall
AzureNSG
CiscoASA
CiscoAsaAma
Corelight
AIVectraStream
CheckPoint
Fortinet
CiscoMeraki
OCI - Multiple rejects on rare ports482c24b9-a700-4b2a-85d3-1c42110ba78cOracleCloudInfrastructureLogsConnector
OCI - SSH scannere087d4fb-af0b-4e08-a067-b9ba9e5f8840OracleCloudInfrastructureLogsConnector
PaloAlto - Possible port scan3575a9c0-51c9-11ec-bf63-0242ac130002CefAma
Disks Alerts From Prancer8c484ef9-d758-4827-9920-f4f77158f03ePrancerLogData
Flow Logs Alerts for Prancer59336232-1bbc-4f66-90dd-5ac3708e4405PrancerLogData
NetworkSecurityGroups Alert From Prancera8babf91-b844-477c-8abf-d31e3df74933PrancerLogData
PAC high severity7caa1c03-d20b-42f2-ac95-5232f6e570daPrancerLogData
Registries Alerts for Prancer08706063-c15e-4d96-beae-9e8d92ccefbbPrancerLogData
Sites Alerts for Prancerbbeb2f26-cb99-4e4b-900f-24ce9809142dPrancerLogData
Storage Accounts Alerts From Prancer4adf2b5d-6b88-4b96-8cc2-a3c7fbbee10bPrancerLogData
Subnets Alerts for Prancer10be8f37-d83c-4b7e-81c2-1271c51ac09fPrancerLogData
Vaults Alerts for Prancer0b76eef3-5dc0-41b1-9f67-fffa7783f5f6PrancerLogData
VirtualNetworkPeerings Alerts From Prancer6bd031cf-78d0-4edd-8191-60f84b6eef7aPrancerLogData
Virtual Machines Alerts for Prancerc13b025c-ea31-4e4b-8e08-955b8fa91fa0PrancerLogData
BTP - Failed access attempts across multiple BAS subaccounts74b243a6-3046-48aa-8b03-e43b3c529cc1SAPBTPAuditEvents
Theom Critical Risksbb9051ef-0e72-4758-a143-80c25ee452f0Theom
Theom High Risks74b80987-0a62-448c-8779-47b02e17d3cfTheom
Theom Insightsd200da84-0191-44ce-ad9e-b85e64c84c89Theom
Theom Low Riskscf7fb616-ac80-40ce-ad18-aa18912811f8Theom
Theom Medium Risks4cb34832-f73a-49f2-8d38-c2d135c5440bTheom
Suspicious link sharing pattern1218175f-c534-421c-8070-5dcaabf28067