Skip to content

Commit

Permalink
Merge pull request Azure#10574 from Azure/v-shukore/NetworkSesionEsse…
Browse files Browse the repository at this point in the history
…ntials

Added mising DC reference in Analytic Rule for Network session Essential Solution
  • Loading branch information
v-atulyadav authored Jun 5, 2024
2 parents d3377f2 + 300dc95 commit 50ceca4
Show file tree
Hide file tree
Showing 18 changed files with 543 additions and 326 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -239,5 +239,6 @@
"InfobloxSOCInsightsDataConnector_Legacy",
"InfobloxSOCInsightsDataConnector_AMA",
"NetskopeDataConnector",
"NetskopeWebTransactionsDataConnector"
"NetskopeWebTransactionsDataConnector",
"CiscoAsaAma"
]
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -41,6 +44,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down Expand Up @@ -184,5 +190,5 @@ customDetails:
alertDetailsOverride:
alertDisplayNameFormat: Anomaly was observed with {{anomalyFieldValue}} Traffic
alertDescriptionFormat: 'Based on past data, anomaly was observed in {{anomalyFieldValue}} Traffic with a score of {{score}}.'
version: 1.0.0
version: 1.0.1
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -41,6 +44,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down Expand Up @@ -183,5 +189,5 @@ alertDetailsOverride:
alertDescriptionFormat: '{{Description}}'
alertTacticsColumnName: Tactic
alertSeverityColumnName: Severity
version: 1.0.1
version: 1.0.2
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -41,6 +44,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down Expand Up @@ -143,5 +149,5 @@ alertDetailsOverride:
alertDescriptionFormat: '{{Description}}'
alertTacticsColumnName: Tactic
alertSeverityColumnName: Severity
version: 1.0.0
version: 1.0.1
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -44,6 +47,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down Expand Up @@ -86,5 +92,5 @@ customDetails:
alertDetailsOverride:
alertDisplayNameFormat: Excessive number of failed connections from {{SrcIpAddr}}
alertDescriptionFormat: 'The client at address {{SrcIpAddr}} generated more than {{threshold}} failures over a 5 minutes time window, which may indicate malicious activity.'
version: 1.2.6
version: 1.2.7
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -41,6 +44,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down Expand Up @@ -80,5 +86,5 @@ customDetails:
alertDetailsOverride:
alertDisplayNameFormat: Network Port Sweep detected on {{DstPortNumber}}
alertDescriptionFormat: 'Network Port Sweep was detection by multiple IPs'
version: 1.0.2
version: 1.0.3
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -43,6 +46,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down Expand Up @@ -90,5 +96,5 @@ entityMappings:
customDetails:
AttemptedPortsCount: AttemptedPortsCount

version: 1.0.5
version: 1.0.6
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -40,6 +43,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down Expand Up @@ -155,5 +161,5 @@ customDetails:
FrequencyTime: MostFrequentTimeDeltaCount
TotalDstBytes: TotalDstBytes

version: 1.1.5
version: 1.1.6
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@
],
"WatchlistDescription": "Monitor Network Session Essentials Solution's' configurable conditions here. Choose between Detection or Hunting for Type and set Threshold type to Static or Anomaly to tune monitoring as needed",
"BasePath": "C:\\Github\\Azure-Sentinel\\Solutions\\Network Session Essentials",
"Version": "3.0.3",
"Version": "3.0.4",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1PConnector": false
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ description-detailed: |
tags:
- Schema: ASimNetworkSessions
SchemaVersion: 0.2.4
SchemaVersion: 0.2.5
requiredDataConnectors:
- connectorId: AWSS3
dataTypes:
Expand All @@ -18,6 +18,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -42,6 +45,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description: |
tags:
- Schema: ASimNetworkSessions
SchemaVersion: 0.2.4
SchemaVersion: 0.2.5
requiredDataConnectors:
- connectorId: AWSS3
dataTypes:
Expand All @@ -16,6 +16,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -40,6 +43,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description: |
tags:
- Schema: ASimNetworkSessions
SchemaVersion: 0.2.4
SchemaVersion: 0.2.5
requiredDataConnectors:
- connectorId: AWSS3
dataTypes:
Expand All @@ -16,6 +16,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -40,6 +43,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description: |
tags:
- Schema: ASimNetworkSessions
SchemaVersion: 0.2.4
SchemaVersion: 0.2.5
requiredDataConnectors:
- connectorId: AWSS3
dataTypes:
Expand All @@ -16,6 +16,9 @@ requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
Expand All @@ -40,6 +43,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: Corelight
dataTypes:
- Corelight_CL
Expand Down
Binary file not shown.
Original file line number Diff line number Diff line change
Expand Up @@ -212,7 +212,7 @@
"name": "analytic7-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This rule identifies a single source that generates an excessive amount of failed connections. Modify the threshold to change the sensitivity of the rule: the higher the threshold, the less sensitive is the rule and less incidents will be generated.<br><br> \n This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema"
"text": "This rule identifies a single source that generates an excessive amount of failed connections. Modify the threshold to change the sensitivity of the rule: the higher the threshold, the less sensitive is the rule and less incidents will be generated.\n This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema"
}
}
]
Expand All @@ -226,7 +226,7 @@
"name": "analytic8-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This rule identifies a possible port scan, in which a single source tries to access a large number of different ports is a short time frame. This may indicate that a [port scanner](https://en.wikipedia.org/wiki/Port_scanner) is trying to identify open ports in order to penetrate a system.<br><br>\nThis analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema"
"text": "This rule identifies a possible port scan, in which a single source tries to access a large number of different ports is a short time frame. This may indicate that a [port scanner](https://en.wikipedia.org/wiki/Port_scanner) is trying to identify open ports in order to penetrate a system.\nThis analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema"
}
}
]
Expand All @@ -240,7 +240,7 @@
"name": "analytic9-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This rule identifies beaconing patterns from Network traffic logs based on recurrent frequency patterns. Such potential outbound beaconing patterns to untrusted public networks should be investigated for any malware callbacks or data exfiltration attempts as discussed in this [Blog](https://medium.com/@HuntOperator/detect-beaconing-with-flare-elastic-stack-and-intrusion-detection-systems-110dc74e0c56).\\<br><br>\nThis analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema'"
"text": "This rule identifies beaconing patterns from Network traffic logs based on recurrent frequency patterns. \nSuch potential outbound beaconing patterns to untrusted public networks should be investigated for any malware callbacks or data exfiltration attempts as discussed in this [Blog](https://medium.com/@HuntOperator/detect-beaconing-with-flare-elastic-stack-and-intrusion-detection-systems-110dc74e0c56).\nThis analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema'"
}
}
]
Expand Down Expand Up @@ -292,7 +292,7 @@
"name": "huntingquery2-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This hunting query detect anomalous pattern in port usage with ASIM normalization. To tune the query to your environment configure it using the 'NetworkSession_Monitor_Configuration' watchlist. This hunting query depends on AWSS3 MicrosoftThreatProtection SecurityEvents WindowsForwardedEvents Zscaler MicrosoftSysmonForLinux PaloAltoNetworks AzureMonitor(VMInsights) AzureFirewall AzureNSG CiscoASA Corelight AIVectraStream CheckPoint Fortinet CiscoMeraki data connector (AWSVPCFlow DeviceNetworkEvents SecurityEvent WindowsEvent CommonSecurityLog Syslog CommonSecurityLog VMConnection AzureDiagnostics AzureDiagnostics CommonSecurityLog Corelight_CL VectraStream CommonSecurityLog CommonSecurityLog Syslog CiscoMerakiNativePoller Parser or Table)"
"text": "This hunting query detect anomalous pattern in port usage with ASIM normalization. To tune the query to your environment configure it using the 'NetworkSession_Monitor_Configuration' watchlist. This hunting query depends on AWSS3 MicrosoftThreatProtection SecurityEvents WindowsSecurityEvents WindowsForwardedEvents Zscaler MicrosoftSysmonForLinux PaloAltoNetworks AzureMonitor(VMInsights) AzureFirewall AzureNSG CiscoASA CiscoAsaAma Corelight AIVectraStream CheckPoint Fortinet CiscoMeraki data connector (AWSVPCFlow DeviceNetworkEvents SecurityEvent SecurityEvent WindowsEvent CommonSecurityLog Syslog CommonSecurityLog VMConnection AzureDiagnostics AzureDiagnostics CommonSecurityLog CommonSecurityLog Corelight_CL VectraStream CommonSecurityLog CommonSecurityLog Syslog CiscoMerakiNativePoller Parser or Table)"
}
}
]
Expand All @@ -306,7 +306,7 @@
"name": "huntingquery3-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "There is an normal amount of traffic that goes on a particular port in any organization. This hunting query identifies port usage higher than threshold defined in 'NetworkSession_Monitor_Configuration' watchlist to determine high port usage. This hunting query depends on AWSS3 MicrosoftThreatProtection SecurityEvents WindowsForwardedEvents Zscaler MicrosoftSysmonForLinux PaloAltoNetworks AzureMonitor(VMInsights) AzureFirewall AzureNSG CiscoASA Corelight AIVectraStream CheckPoint Fortinet CiscoMeraki data connector (AWSVPCFlow DeviceNetworkEvents SecurityEvent WindowsEvent CommonSecurityLog Syslog CommonSecurityLog VMConnection AzureDiagnostics AzureDiagnostics CommonSecurityLog Corelight_CL VectraStream CommonSecurityLog CommonSecurityLog Syslog CiscoMerakiNativePoller Parser or Table)"
"text": "There is an normal amount of traffic that goes on a particular port in any organization. This hunting query identifies port usage higher than threshold defined in 'NetworkSession_Monitor_Configuration' watchlist to determine high port usage. This hunting query depends on AWSS3 MicrosoftThreatProtection SecurityEvents WindowsSecurityEvents WindowsForwardedEvents Zscaler MicrosoftSysmonForLinux PaloAltoNetworks AzureMonitor(VMInsights) AzureFirewall AzureNSG CiscoASA CiscoAsaAma Corelight AIVectraStream CheckPoint Fortinet CiscoMeraki data connector (AWSVPCFlow DeviceNetworkEvents SecurityEvent SecurityEvent WindowsEvent CommonSecurityLog Syslog CommonSecurityLog VMConnection AzureDiagnostics AzureDiagnostics CommonSecurityLog CommonSecurityLog Corelight_CL VectraStream CommonSecurityLog CommonSecurityLog Syslog CiscoMerakiNativePoller Parser or Table)"
}
}
]
Expand All @@ -320,7 +320,7 @@
"name": "huntingquery4-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Ideally one user should be associated with one MAC ID, this hunting query will identify if same MAC ID is associated with more than one user which can be a case of MAC spoofing attack. This hunting query depends on AWSS3 MicrosoftThreatProtection SecurityEvents WindowsForwardedEvents Zscaler MicrosoftSysmonForLinux PaloAltoNetworks AzureMonitor(VMInsights) AzureFirewall AzureNSG CiscoASA Corelight AIVectraStream CheckPoint Fortinet CiscoMeraki data connector (AWSVPCFlow DeviceNetworkEvents SecurityEvent WindowsEvent CommonSecurityLog Syslog CommonSecurityLog VMConnection AzureDiagnostics AzureDiagnostics CommonSecurityLog Corelight_CL VectraStream CommonSecurityLog CommonSecurityLog Syslog CiscoMerakiNativePoller Parser or Table)"
"text": "Ideally one user should be associated with one MAC ID, this hunting query will identify if same MAC ID is associated with more than one user which can be a case of MAC spoofing attack. This hunting query depends on AWSS3 MicrosoftThreatProtection SecurityEvents WindowsSecurityEvents WindowsForwardedEvents Zscaler MicrosoftSysmonForLinux PaloAltoNetworks AzureMonitor(VMInsights) AzureFirewall AzureNSG CiscoASA CiscoAsaAma Corelight AIVectraStream CheckPoint Fortinet CiscoMeraki data connector (AWSVPCFlow DeviceNetworkEvents SecurityEvent SecurityEvent WindowsEvent CommonSecurityLog Syslog CommonSecurityLog VMConnection AzureDiagnostics AzureDiagnostics CommonSecurityLog CommonSecurityLog Corelight_CL VectraStream CommonSecurityLog CommonSecurityLog Syslog CiscoMerakiNativePoller Parser or Table)"
}
}
]
Expand All @@ -334,7 +334,7 @@
"name": "huntingquery5-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Every standard app has a port associated with it. This query will identify if destination port associated with destination app is not standard which can be a case of network spoofing attack. This hunting query depends on AWSS3 MicrosoftThreatProtection SecurityEvents WindowsForwardedEvents Zscaler MicrosoftSysmonForLinux PaloAltoNetworks AzureMonitor(VMInsights) AzureFirewall AzureNSG CiscoASA Corelight AIVectraStream CheckPoint Fortinet CiscoMeraki data connector (AWSVPCFlow DeviceNetworkEvents SecurityEvent WindowsEvent CommonSecurityLog Syslog CommonSecurityLog VMConnection AzureDiagnostics AzureDiagnostics CommonSecurityLog Corelight_CL VectraStream CommonSecurityLog CommonSecurityLog Syslog CiscoMerakiNativePoller Parser or Table)"
"text": "Every standard app has a port associated with it. This query will identify if destination port associated with destination app is not standard which can be a case of network spoofing attack. This hunting query depends on AWSS3 MicrosoftThreatProtection SecurityEvents WindowsSecurityEvents WindowsForwardedEvents Zscaler MicrosoftSysmonForLinux PaloAltoNetworks AzureMonitor(VMInsights) AzureFirewall AzureNSG CiscoASA CiscoAsaAma Corelight AIVectraStream CheckPoint Fortinet CiscoMeraki data connector (AWSVPCFlow DeviceNetworkEvents SecurityEvent SecurityEvent WindowsEvent CommonSecurityLog Syslog CommonSecurityLog VMConnection AzureDiagnostics AzureDiagnostics CommonSecurityLog CommonSecurityLog Corelight_CL VectraStream CommonSecurityLog CommonSecurityLog Syslog CiscoMerakiNativePoller Parser or Table)"
}
}
]
Expand Down
Loading

0 comments on commit 50ceca4

Please sign in to comment.