Azure-Sentinel/Detections/PulseConnectSecure/PulseConnectSecureVPN-Disti...

33 строки
956 B
YAML

id: 1fa1528e-f746-4794-8a41-14827f4cb798
name: PulseConnectSecure - Large Number of Distinct Failed User Logins
description: |
'This query identifies evidence of failed login attempts from a large number of distinct users on a Pulse Connect Secure VPN server'
severity: Medium
requiredDataConnectors:
- connectorId: PulseConnectSecure
dataTypes:
- Syslog
queryFrequency: 1h
queryPeriod: 1h
triggerOperator: gt
triggerThreshold: 0
tactics:
- CredentialAccess
relevantTechniques:
- T1110
query: |
let timeframe = ago(1h);
let threshold = 100;
PulseConnectSecure
| where TimeGenerated >= timeframe
| where Messages startswith "Login failed"
| summarize dcount(User) by Computer, bin(TimeGenerated, 15m)
| where dcount_User > threshold
| extend timestamp = TimeGenerated, HostCustomEntity = Computer
entityMappings:
- entityType: Host
fieldMappings:
- identifier: FullName
columnName: HostCustomEntity