Azure-Sentinel/Detections
Shain 83ae7d405f
Merge pull request #1802 from Azure/shainw-fixuphunt
Moving Teams queries out of folder and removing duplicates, plus mapp…
2021-03-09 10:25:34 -08:00
..
AWSCloudTrail Merge branch 'master' of https://github.com/Azure/Azure-Sentinel into feature/ambergma/fixTimeRange 2021-02-22 15:19:06 +02:00
AlsidForAD Replace hard coded codenames by datatable in analytic rules 2020-12-07 11:55:04 +01:00
AuditLogs capitalize for consistency 2021-03-04 10:54:36 -08:00
AzureActivity fix the tune generated issue 2021-02-22 15:08:44 +02:00
AzureDevOpsAuditing Update AzDOPatSessionMisuse.yaml 2021-02-23 10:48:35 -08:00
AzureDiagnostics fix the tune generated issue 2021-02-22 15:08:44 +02:00
AzureFirewall fix the tune generated issue 2021-02-22 15:08:44 +02:00
CiscoUmbrella cisco umbrella rules - updated entityMappings in rules 2021-02-01 17:30:53 +02:00
CommonSecurityLog fix the tune generated issue 2021-02-22 15:08:44 +02:00
CyberpionSecurityLogs Cr fixes 2021-01-26 09:15:15 +02:00
DeviceEvents capitalize for consistency 2021-03-04 10:54:36 -08:00
DeviceFileEvents Add identifier-level validation for new entity mappings in templates (#1680) 2021-01-31 16:35:50 +02:00
DeviceNetworkEvents Add identifier-level validation for new entity mappings in templates (#1680) 2021-01-31 16:35:50 +02:00
DeviceProcessEvents capitalize for consistency 2021-03-04 10:54:36 -08:00
DnsEvents fix the tune generated issue 2021-02-22 15:08:44 +02:00
EsetSMC Feature/lahisham/migrate scheduled templates to new entity mapping (#1319) 2020-11-17 17:27:25 +02:00
GitHub fix the tune generated issue 2021-02-22 15:08:44 +02:00
InfobloxNIOS fix the tune generated issue 2021-02-22 15:08:44 +02:00
LAQueryLogs Merge branch 'master' of https://github.com/Azure/Azure-Sentinel into feature/ambergma/fixTimeRange 2021-02-22 15:19:06 +02:00
MultipleDataSources Merge pull request #1882 from Azure/pebryan/2021-3-5_ExchangeIOCs 2021-03-08 16:23:02 -08:00
OfficeActivity Merge pull request #1802 from Azure/shainw-fixuphunt 2021-03-09 10:25:34 -08:00
OktaSSO fix the tune generated issue 2021-02-22 15:08:44 +02:00
ProofpointPOD proofpoint pod - fixed detection ProofpointPODWeakCiphers.yaml 2021-02-17 15:04:39 +02:00
ProofpointTAP fix the tune generated issue 2021-02-22 15:08:44 +02:00
PulseConnectSecure fix the tune generated issue 2021-02-22 15:08:44 +02:00
QualysVM fix the tune generated issue 2021-02-22 15:08:44 +02:00
SecurityAlert capitalize for consistency 2021-03-04 10:54:36 -08:00
SecurityEvent Update HAFNIUMSuspiciousIMServiceError.yaml 2021-03-08 16:11:28 +01:00
SigninLogs capitalize for consistency 2021-03-04 10:54:36 -08:00
SophosXGFirewall fix the tune generated issue 2021-02-22 15:08:44 +02:00
SymantecProxySG fix the tune generated issue 2021-02-22 15:08:44 +02:00
SymantecVIP fix the tune generated issue 2021-02-22 15:08:44 +02:00
Syslog fix the tune generated issue 2021-02-22 15:08:44 +02:00
ThreatIntelligenceIndicator updating connector value in template 2021-01-15 16:29:02 -08:00
TrendMicroXDR fix the tune generated issue 2021-02-22 15:08:44 +02:00
VMwareCarbonBlack fix the tune generated issue 2021-02-22 15:08:44 +02:00
W3CIISLog Merge branch 'master' into pebryan/2020-3-2_HAFFNIUM 2021-03-02 13:33:09 -08:00
ZoomLogs Merge branch 'master' of https://github.com/Azure/Azure-Sentinel into feature/ambergma/fixTimeRange 2021-02-22 15:19:06 +02:00
htttp_proxy_oab_CL Merge branch 'master' into HAFNIUMFix 2021-03-04 09:32:33 -08:00
readme.md Update readme.md 2020-06-26 11:46:22 -07:00

readme.md

About

This folder contains Detections based on different types of data sources that you can leverage in order to create alerts and respond to threats in your environment.

For general information please start with the Wiki pages.

More Specific to Detections:

  • Contribute to Analytic Templates (Detections) and Hunting queries
  • Specifics on what is required for Detections and Hunting queries is in the Query Style Guide
  • These detections are written using KQL query langauge and will provide you a starting point to protect your environment and get familiar with the different data tables.
  • To enable these detections in your environment follow the out of the box guidance.
  • The rule created will run the query on the scheduled time that was defined, and trigger an alert that will be seen both in the SecurityAlert table and in a case in the Incidents tab

Feedback

For questions or feedback, please contact AzureSentinel@microsoft.com