Updating NetworkSession Rules for AnomalyFoundInNetworkSessionTraffic.yaml and DetectPortMisuseByAnomalyBasedDetection.yaml
#12788
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This pull request simplifies and unifies the anomaly detection logic in two analytic rule queries by lowering the threshold for event per second (eps) filtering and removing redundant code blocks. The main impact is that both rules now use a single eps threshold, making the logic more consistent and easier to maintain.
Query simplification and threshold unification:
Lowered the eps threshold from
> 1000andbetween (501 .. 1000)to a single condition> 500in bothAnomalyFoundInNetworkSessionTraffic.yamlandDetectPortMisuseByAnomalyBasedDetection.yaml, streamlining the detection logic. [1] [2]Removed duplicate and redundant query blocks that previously handled different eps ranges, reducing code complexity and improving maintainability. [1] [2] Required items, please complete
Change(s):
Reason for Change(s):
Version Updated:
Testing Completed:
Checked that the validations are passing and have addressed any issues that are present:
Guidance <- remove section before submitting
Before submitting this PR please ensure that you have read the following sections and filled out the changes, reason for change and testing complete sections:
Thank you for your contribution to the Microsoft Sentinel Github repo.
Change(s):
Reason for Change(s):
Version updated:
Testing Completed:
Note: If updating a detection, you must update the version field.
Checked that the validations are passing and have addressed any issues that are present:
Note: Let us know if you have tried fixing the validation error and need help.