Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

ResourceDevelopment

Overview

Rule NameidRequired data connectors
Cisco SDWAN - Maleware Eventscb14defd-3415-4420-a2e4-2dd0f3e07a86CiscoSDWAN
Brand Abuse6e9e1975-6d85-4387-bd30-3881c66e302eCBSPollingIDAzureFunctions
Brand Impersonation - HIGHbf93bd26-cad8-40a3-bde0-71acb874d595CBSPollingIDAzureFunctions
Brand Impersonation - INFO40045fff-d01f-4165-af5f-aca94fd402afCBSPollingIDAzureFunctions
Exposed Email Addressb25aae75-d333-4b77-a7c1-b24644dc1e1fCBSPollingIDAzureFunctions
Exposed User List2caf81cf-a419-4d56-91da-67368f2e73d2HVPollingIDAzureFunctions
Leaked Credentiala0a46e91-3f94-4ed4-ab70-ecd36ae0ead0CBSPollingIDAzureFunctions
Suspicious Mobile App High6e9afac9-6828-486f-b1d8-cf76e86e1224CBSPollingIDAzureFunctions
Suspicious Mobile App INFO18155351-23b6-4684-bca6-23c11e4ff5c1CBSPollingIDAzureFunctions
Flare SSL Certificate result9cb7c337-f179-4af6-b0e8-b6b7552d762dFlare
New onmicrosoft domain added to tenant4f42b94f-b210-42d1-a023-7fa1c51d969fAzureActiveDirectory
Detection of Specific Hashes in CommonSecurityLog388e197d-ec9e-46b6-addb-947d74d2a5c4CEF
CefAma
Semperis DSP Operations Critical Notifications8f471e21-3bb2-466f-9bc2-0a0326a60788SemperisDSP
ZeroFox Alerts - High Severity Alertsdeb45e6d-892f-40bf-9118-e2a6f26b788dZeroFox_Alert_Polling
ZeroFox Alerts - Informational Severity Alerts6f7a7413-b72f-4361-84ee-897baeb9c6d4ZeroFox_Alert_Polling
ZeroFox Alerts - Low Severity Alertse0c7a91a-7aa1-498a-9c20-cd6c721f9345ZeroFox_Alert_Polling
ZeroFox Alerts - Medium Severity Alertsa6496de5-911b-4199-b7db-d34ac9d70df3ZeroFox_Alert_Polling