Azure-Sentinel/Detections
Pete Bryan e0bf1c4687
Merge pull request #9164 from Azure/shainw-entityMapFilx_2
Improving entity mapping - Set 2
2023-10-05 22:11:54 -07:00
..
ASimAuthentication Update imAuthSigninsMultipleCountries.yaml 2023-07-12 13:16:42 +02:00
ASimDNS Standalone tagging of detections 2023-08-21 16:09:51 +05:30
ASimFileEvent BEC threat ceentric Solution Packaging 2023-08-04 16:49:31 +05:30
ASimNetworkSession Added skip validations 2023-04-10 18:14:36 +05:30
ASimProcess Standalone tagging of detections 2023-08-21 16:09:51 +05:30
ASimWebSession removed filename from customDetails 2023-06-14 10:53:54 +05:30
AWSCloudTrail BEC threat ceentric Solution Packaging 2023-08-04 16:49:31 +05:30
AWSGuardDuty version update 2023-03-01 00:06:08 +05:30
Anomalies Standalone tagging of detections 2023-08-21 16:09:51 +05:30
AuditLogs bump versions 2023-08-30 12:54:37 +02:00
AzureActivity Updating entity mappings to remove legacy support and map additional entities. 2023-09-25 18:18:25 -07:00
AzureAppServices Updating entity mappings to remove legacy support and map additional entities. 2023-09-25 18:18:25 -07:00
AzureDevOpsAuditing skip validations 2022-09-22 19:24:32 +05:30
AzureDiagnostics version update 2023-03-01 00:06:08 +05:30
AzureFirewall version update 2023-03-01 00:06:08 +05:30
AzureWAF addittion 2023-03-24 11:39:30 +05:30
BehaviorAnalytics Standalone tagging of detections 2023-08-21 16:09:51 +05:30
CiscoUmbrella Incremented the version to pass PR validations 2022-11-02 17:38:58 +05:30
CommonSecurityLog Updating entity mappings to remove legacy support and map additional entities. 2023-09-25 18:18:25 -07:00
DeviceEvents 🐛 Fix broken migration links 2022-09-13 14:11:01 +01:00
DeviceFileEvents Indention changed 2022-10-31 13:21:26 +05:30
DeviceNetworkEvents 🐛 Fix broken migration links 2022-09-13 14:11:01 +01:00
DeviceProcessEvents Testing removal of entity mapping for UPNSuffix to see why I received length failure in GitHub validation code. 2023-09-25 18:55:31 -07:00
DnsEvents version update 2023-03-01 00:06:08 +05:30
DuoSecurity Update IPEntity_DuoSecurity.yaml 2023-03-01 10:28:56 +05:30
GitHub Detection Migration tagging 2023-07-27 18:01:39 +05:30
Heartbeat 🐛 Remove preceding newlines in queries 2022-12-28 19:58:31 +11:00
LAQueryLogs updated author name 2023-09-25 18:23:37 -07:00
MultipleDataSources Merge pull request #9164 from Azure/shainw-entityMapFilx_2 2023-10-05 22:11:54 -07:00
OfficeActivity BEC threat ceentric Solution Packaging 2023-08-04 16:49:31 +05:30
ProofpointPOD Repackaging ProofPointPOD 2023-03-28 14:17:17 +05:30
PulseConnectSecure MetaData tagged for remaining analytics 2022-10-31 18:07:11 +05:30
QualysVM 🐛 Remove preceding newlines in queries 2022-12-28 19:58:31 +11:00
QualysVMV2 updating Version 2023-03-01 14:42:57 +05:30
SecurityAlert Standalone Content Renaming (#7981) 2023-05-08 18:52:09 +05:30
SecurityEvent 🐛 Handle SubStatus mixed case 2023-05-21 08:53:24 +01:00
SecurityNestedRecommendation version update 2023-03-01 17:36:16 +05:30
SigninLogs bump versions 2023-08-30 12:54:37 +02:00
Syslog version update 2023-03-01 17:36:16 +05:30
ThreatIntelligenceIndicator version update 2023-03-01 17:36:16 +05:30
W3CIISLog Packaging Web Shells Threat Protection 2023-05-23 11:29:35 +05:30
WindowsEvents Standalone Content Renaming (#7981) 2023-05-08 18:52:09 +05:30
ZoomLogs 🐛 Remove preceding newlines in queries 2022-12-28 19:58:31 +11:00
http_proxy_oab_CL Standalone Content Renaming (#7981) 2023-05-08 18:52:09 +05:30
readme.md fixed broken McAfee link and improved wording (#6387) 2022-10-31 18:16:32 +05:30

readme.md

About

This folder contains Detections based on different types of data sources that you can leverage in order to create alerts and respond to threats in your environment. These detections are termed as Analytics Rule templates in Microsoft Sentinel.

Note: Many of these analytic rule templates are being delivered in Solutions for Microsoft Sentinel. You can discover and deploy those in Microsoft Sentinel Content Hub. These are available in this repository under Solutions folder. For example, Analytic rules for the McAfee ePolicy Orchestrator solution are found here.

For general information please start with the Wiki pages.

More Specific to Detections:

  • Contribute to Analytic Templates (Detections) and Hunting queries
  • Specifics on what is required for Detections and Hunting queries is in the Query Style Guide
  • These detections are written using KQL query langauge and will provide you a starting point to protect your environment and get familiar with the different data tables.
  • To enable these detections in your environment follow the out of the box guidance (Notice that after a detection is available in this GitHub, it might take up to 2 weeks before it is available in Microsoft Sentinel portal).
  • The rule created will run the query on the scheduled time that was defined, and trigger an alert that will be seen both in the SecurityAlert table and in a case in the Incidents tab
  • If you are contributing analytic rule templates as part of a solution, follow guidance for solutions to include those in the right folder paths. Do NOT include content to be packaged in solutions under the Detections folder.

Feedback

For questions or feedback, please contact AzureSentinel@microsoft.com