Azure-Sentinel/Detections
v-sabiraj 64b5d72978 Update imAuthSigninsMultipleCountries.yaml 2024-06-28 12:42:06 +05:30
..
ASimAuthentication Update imAuthSigninsMultipleCountries.yaml 2024-06-28 12:42:06 +05:30
ASimDNS Update versions 2024-05-10 12:36:09 +10:00
ASimFileEvent
ASimNetworkSession
ASimProcess Merge pull request #10050 from Azure/shainw-Dev-0228-entitymapFix 2024-02-26 12:00:31 -08:00
ASimWebSession 🐛 Fix DGA alert name override placeholder 2024-06-06 12:26:27 +01:00
AWSCloudTrail
AWSGuardDuty
Anomalies
AuditLogs Update ServicePrincipalAssignedPrivilegedRole.yaml 2024-02-27 06:56:33 -08:00
AzureActivity Update versions 2024-05-10 12:36:09 +10:00
AzureAppServices
AzureDevOpsAuditing
AzureDiagnostics
AzureFirewall
AzureWAF
BehaviorAnalytics
CiscoUmbrella
CommonSecurityLog Update versions 2024-05-10 12:36:09 +10:00
DeviceEvents
DeviceFileEvents
DeviceNetworkEvents
DeviceProcessEvents
DnsEvents
DuoSecurity Entity Work April 16 2024-04-16 15:01:28 -07:00
GitHub
Heartbeat Update versions 2024-05-10 12:36:09 +10:00
LAQueryLogs Update versions 2024-05-10 12:36:09 +10:00
MultipleDataSources 🐛 Remove preceding newlines in queries 2024-06-14 14:23:17 +01:00
OfficeActivity
ProofpointPOD
PulseConnectSecure Entity Work April 16 2024-04-16 15:01:28 -07:00
QualysVM
QualysVMV2
SecurityAlert Update versions 2024-05-10 12:36:09 +10:00
SecurityEvent Update versions 2024-05-10 12:36:09 +10:00
SecurityNestedRecommendation Update versions 2024-05-10 12:36:09 +10:00
SigninLogs Update AnomalousSingleFactorSignin.yaml 2024-06-14 12:48:42 +01:00
Syslog
ThreatIntelligenceIndicator
W3CIISLog Update versions 2024-05-10 12:36:09 +10:00
WindowsEvents
ZoomLogs Entity Work April 22 2024-04-22 10:34:53 -07:00
http_proxy_oab_CL Entity Work April 22 2024-04-22 10:34:53 -07:00
readme.md

readme.md

About

This folder contains Detections based on different types of data sources that you can leverage in order to create alerts and respond to threats in your environment. These detections are termed as Analytics Rule templates in Microsoft Sentinel.

Note: Many of these analytic rule templates are being delivered in Solutions for Microsoft Sentinel. You can discover and deploy those in Microsoft Sentinel Content Hub. These are available in this repository under Solutions folder. For example, Analytic rules for the McAfee ePolicy Orchestrator solution are found here.

For general information please start with the Wiki pages.

More Specific to Detections:

  • Contribute to Analytic Templates (Detections) and Hunting queries
  • Specifics on what is required for Detections and Hunting queries is in the Query Style Guide
  • These detections are written using KQL query langauge and will provide you a starting point to protect your environment and get familiar with the different data tables.
  • To enable these detections in your environment follow the out of the box guidance (Notice that after a detection is available in this GitHub, it might take up to 2 weeks before it is available in Microsoft Sentinel portal).
  • The rule created will run the query on the scheduled time that was defined, and trigger an alert that will be seen both in the SecurityAlert table and in a case in the Incidents tab
  • If you are contributing analytic rule templates as part of a solution, follow guidance for solutions to include those in the right folder paths. Do NOT include content to be packaged in solutions under the Detections folder.

Feedback

For questions or feedback, please contact AzureSentinel@microsoft.com