Azure-Sentinel/Detections
v-ampami b1e7baf692 Move Ubiquiti to Solution folder 2021-03-30 13:36:28 +05:30
..
AWSCloudTrail Merge branch 'master' of https://github.com/Azure/Azure-Sentinel into feature/ambergma/fixTimeRange 2021-02-22 15:19:06 +02:00
AlsidForAD Add analytic rules for IoAs 2021-01-17 13:42:34 +01:00
AuditLogs Update UseraddedtoPrivilgedGroups.yaml 2021-03-25 09:43:51 +02:00
AzureActivity fix the tune generated issue 2021-02-22 15:08:44 +02:00
AzureDevOpsAuditing Update AzDOPatSessionMisuse.yaml 2021-02-23 10:48:35 -08:00
AzureDiagnostics fix the tune generated issue 2021-02-22 15:08:44 +02:00
AzureFirewall fix the tune generated issue 2021-02-22 15:08:44 +02:00
CiscoUmbrella cisco umbrella - update detection rule 2021-03-29 13:20:33 +03:00
CommonSecurityLog fix the tune generated issue 2021-02-22 15:08:44 +02:00
CyberpionSecurityLogs Cr fixes 2021-01-26 09:15:15 +02:00
DeviceEvents capitalize for consistency 2021-03-04 10:54:36 -08:00
DeviceFileEvents Add identifier-level validation for new entity mappings in templates (#1680) 2021-01-31 16:35:50 +02:00
DeviceNetworkEvents Add identifier-level validation for new entity mappings in templates (#1680) 2021-01-31 16:35:50 +02:00
DeviceProcessEvents capitalize for consistency 2021-03-04 10:54:36 -08:00
DnsEvents fix the tune generated issue 2021-02-22 15:08:44 +02:00
EsetSMC Feature/lahisham/migrate scheduled templates to new entity mapping (#1319) 2020-11-17 17:27:25 +02:00
GitHub fix the tune generated issue 2021-02-22 15:08:44 +02:00
InfobloxNIOS fix the tune generated issue 2021-02-22 15:08:44 +02:00
LAQueryLogs Merge branch 'master' of https://github.com/Azure/Azure-Sentinel into feature/ambergma/fixTimeRange 2021-02-22 15:19:06 +02:00
MultipleDataSources Merge pull request #1880 from Azure/mohitkusecurity/NetSec-Azure-Sentinel 2021-03-15 12:26:12 -07:00
OfficeActivity Merge pull request #1802 from Azure/shainw-fixuphunt 2021-03-09 10:25:34 -08:00
OktaSSO fix the tune generated issue 2021-02-22 15:08:44 +02:00
ProofpointPOD proofpoint pod - fixed detection ProofpointPODWeakCiphers.yaml 2021-02-17 15:04:39 +02:00
ProofpointTAP fix the tune generated issue 2021-02-22 15:08:44 +02:00
PulseConnectSecure fix the tune generated issue 2021-02-22 15:08:44 +02:00
QualysVM fix the tune generated issue 2021-02-22 15:08:44 +02:00
SecurityAlert capitalize for consistency 2021-03-04 10:54:36 -08:00
SecurityEvent Merge pull request #1944 from Azure/HealthServiceDLLs 2021-03-24 21:50:49 -07:00
SigninLogs capitalize for consistency 2021-03-04 10:54:36 -08:00
SophosXGFirewall fix the tune generated issue 2021-02-22 15:08:44 +02:00
SymantecProxySG fix the tune generated issue 2021-02-22 15:08:44 +02:00
SymantecVIP fix the tune generated issue 2021-02-22 15:08:44 +02:00
Syslog fix the tune generated issue 2021-02-22 15:08:44 +02:00
ThreatIntelligenceIndicator Fixed Emailaddress field to match with TI 2021-03-24 12:48:42 -07:00
TrendMicroXDR fix the tune generated issue 2021-02-22 15:08:44 +02:00
VMwareCarbonBlack fix the tune generated issue 2021-02-22 15:08:44 +02:00
W3CIISLog Removing dupes 2021-03-15 09:54:45 -07:00
ZoomLogs Merge branch 'master' of https://github.com/Azure/Azure-Sentinel into feature/ambergma/fixTimeRange 2021-02-22 15:19:06 +02:00
http_proxy_oab_CL Updated to expand 2 queries 2021-03-10 10:35:27 -08:00
readme.md Update readme.md 2020-06-26 11:46:22 -07:00

readme.md

About

This folder contains Detections based on different types of data sources that you can leverage in order to create alerts and respond to threats in your environment.

For general information please start with the Wiki pages.

More Specific to Detections:

  • Contribute to Analytic Templates (Detections) and Hunting queries
  • Specifics on what is required for Detections and Hunting queries is in the Query Style Guide
  • These detections are written using KQL query langauge and will provide you a starting point to protect your environment and get familiar with the different data tables.
  • To enable these detections in your environment follow the out of the box guidance.
  • The rule created will run the query on the scheduled time that was defined, and trigger an alert that will be seen both in the SecurityAlert table and in a case in the Incidents tab

Feedback

For questions or feedback, please contact AzureSentinel@microsoft.com