Skip to content

Commit 5961c8d

Browse files
anat-gilensonAnat Gilenson
andauthored
Add AlertRules to microsoft.security insights 2021 10 01 (#15657)
* Adds base for updating Microsoft.SecurityInsight's AlertRules from version stable/2020-01-01 to version 2021-10-01 * Updates API version in AlertRules specs and examples * Use common types in AlertRules.json and remove redundant SecurityInsights * Add AlertRules to readme * Copy action examples for alert rules * Add type:object where missing * Align CloudError with rest of the resources in this version * Update readme Co-authored-by: Anat Gilenson <[email protected]>
1 parent f207d70 commit 5961c8d

18 files changed

+2111
-78
lines changed

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/AlertRules.json

Lines changed: 1442 additions & 0 deletions
Large diffs are not rendered by default.

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/Incidents.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1707,6 +1707,7 @@
17071707
}
17081708
}
17091709
},
1710+
"type": "object",
17101711
"required": [
17111712
"value"
17121713
]

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/ThreatIntelligence.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -502,7 +502,8 @@
502502
"description": "The error object of the CloudError response"
503503
}
504504
},
505-
"description": "An error response for a resource management request."
505+
"description": "An error response for a resource management request.",
506+
"type": "object"
506507
},
507508
"ThreatIntelligenceInformation": {
508509
"allOf": [
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"parameters": {
3+
"api-version": "2021-10-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalInsights",
8+
"ruleId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
9+
"actionId": "912bec42-cb66-4c03-ac63-1761b6898c3e",
10+
"action": {
11+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
12+
"properties": {
13+
"triggerUri": "https://prod-31.northcentralus.logic.azure.com:443/workflows/cd3765391efd48549fd7681ded1d48d7/triggers/manual/paths/invoke?api-version=2016-10-01&sp=%2Ftriggers%2Fmanual%2Frun&sv=1.0&sig=signature",
14+
"logicAppResourceId": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.Logic/workflows/MyAlerts"
15+
}
16+
}
17+
},
18+
"responses": {
19+
"200": {
20+
"body": {
21+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRules/73e01a99-5cd7-4139-a149-9f2736ff2ab5/actions/912bec42-cb66-4c03-ac63-1761b6898c3e",
22+
"name": "912bec42-cb66-4c03-ac63-1761b6898c3e",
23+
"type": "Microsoft.SecurityInsights/alertRules/actions",
24+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
25+
"properties": {
26+
"workflowId": "cd3765391efd48549fd7681ded1d48d7",
27+
"logicAppResourceId": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.Logic/workflows/MyAlerts"
28+
}
29+
}
30+
},
31+
"201": {
32+
"body": {
33+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRules/73e01a99-5cd7-4139-a149-9f2736ff2ab5/actions/912bec42-cb66-4c03-ac63-1761b6898c3e",
34+
"name": "912bec42-cb66-4c03-ac63-1761b6898c3e",
35+
"type": "Microsoft.SecurityInsights/alertRules/actions",
36+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
37+
"properties": {
38+
"workflowId": "cd3765391efd48549fd7681ded1d48d7",
39+
"logicAppResourceId": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.Logic/workflows/MyAlerts"
40+
}
41+
}
42+
}
43+
}
44+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
{
2+
"parameters": {
3+
"api-version": "2021-10-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalIinsights",
8+
"ruleId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
9+
"actionId": "912bec42-cb66-4c03-ac63-1761b6898c3e"
10+
},
11+
"responses": {
12+
"200": {},
13+
"204": {}
14+
}
15+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
{
2+
"parameters": {
3+
"api-version": "2021-10-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalIinsights",
8+
"ruleId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
9+
"actionId": "912bec42-cb66-4c03-ac63-1761b6898c3e"
10+
},
11+
"responses": {
12+
"200": {
13+
"body": {
14+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRules/73e01a99-5cd7-4139-a149-9f2736ff2ab5/actions/912bec42-cb66-4c03-ac63-1761b6898c3e",
15+
"name": "912bec42-cb66-4c03-ac63-1761b6898c3e",
16+
"type": "Microsoft.SecurityInsights/alertRules/actions",
17+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
18+
"properties": {
19+
"workflowId": "cd3765391efd48549fd7681ded1d48d7",
20+
"logicAppResourceId": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.Logic/workflows/MyAlerts"
21+
}
22+
}
23+
}
24+
}
25+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
{
2+
"parameters": {
3+
"api-version": "2021-10-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalIinsights",
8+
"ruleId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5"
9+
},
10+
"responses": {
11+
"200": {
12+
"body": {
13+
"value": [
14+
{
15+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRules/73e01a99-5cd7-4139-a149-9f2736ff2ab5/actions/912bec42-cb66-4c03-ac63-1761b6898c3e",
16+
"name": "912bec42-cb66-4c03-ac63-1761b6898c3e",
17+
"type": "Microsoft.SecurityInsights/alertRules/actions",
18+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
19+
"properties": {
20+
"workflowId": "cd3765391efd48549fd7681ded1d48d7",
21+
"logicAppResourceId": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.Logic/workflows/MyAlerts"
22+
}
23+
}
24+
]
25+
}
26+
}
27+
}
28+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
{
2+
"parameters": {
3+
"api-version": "2021-10-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalInsights",
8+
"alertRuleTemplateId": "65360bb0-8986-4ade-a89d-af3cf44d28aa"
9+
},
10+
"responses": {
11+
"200": {
12+
"body": {
13+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRuleTemplates/65360bb0-8986-4ade-a89d-af3cf44d28aa",
14+
"name": "65360bb0-8986-4ade-a89d-af3cf44d28aa",
15+
"type": "Microsoft.SecurityInsights/AlertRuleTemplates",
16+
"kind": "Scheduled",
17+
"properties": {
18+
"severity": "Low",
19+
"query": "let timeframe = 1d;\nAWSCloudTrail\n| where TimeGenerated >= ago(timeframe)\n| where EventName == \"CreateNetworkAclEntry\"\n or EventName == \"CreateRoute\"\n| project TimeGenerated, EventName, EventTypeName, UserIdentityAccountId, UserIdentityPrincipalid, UserAgent, UserIdentityUserName, SessionMfaAuthenticated, SourceIpAddress, AWSRegion, EventSource, AdditionalEventData, ResponseElements\n| extend AccountCustomEntity = UserIdentityUserName, IPCustomEntity = SourceIpAddress",
20+
"queryFrequency": "P1D",
21+
"queryPeriod": "P1D",
22+
"triggerOperator": "GreaterThan",
23+
"triggerThreshold": 0,
24+
"displayName": "Changes to Amazon VPC settings",
25+
"description": "This alert monitors changes to Amazon VPC (Virtual Private Cloud) settings such as new ACL entries and routes in route tables.\nMore information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255 \nand https://aws.amazon.com/vpc/",
26+
"tactics": [
27+
"PrivilegeEscalation",
28+
"LateralMovement"
29+
],
30+
"createdDateUTC": "2019-02-27T00:00:00Z",
31+
"status": "Available",
32+
"requiredDataConnectors": [
33+
{
34+
"connectorId": "AWS",
35+
"dataTypes": [
36+
"AWSCloudTrail"
37+
]
38+
}
39+
],
40+
"alertRulesCreatedByTemplateCount": 0
41+
}
42+
}
43+
}
44+
}
45+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
{
2+
"parameters": {
3+
"api-version": "2021-10-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalInsights"
8+
},
9+
"responses": {
10+
"200": {
11+
"body": {
12+
"value": [
13+
{
14+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/AlertRuleTemplates/65360bb0-8986-4ade-a89d-af3cf44d28aa",
15+
"name": "65360bb0-8986-4ade-a89d-af3cf44d28aa",
16+
"type": "Microsoft.SecurityInsights/AlertRuleTemplates",
17+
"kind": "Scheduled",
18+
"properties": {
19+
"severity": "Low",
20+
"query": "let timeframe = 1d;\nAWSCloudTrail\n| where TimeGenerated >= ago(timeframe)\n| where EventName == \"CreateNetworkAclEntry\"\n or EventName == \"CreateRoute\"\n| project TimeGenerated, EventName, EventTypeName, UserIdentityAccountId, UserIdentityPrincipalid, UserAgent, UserIdentityUserName, SessionMfaAuthenticated, SourceIpAddress, AWSRegion, EventSource, AdditionalEventData, ResponseElements\n| extend AccountCustomEntity = UserIdentityUserName, IPCustomEntity = SourceIpAddress",
21+
"queryFrequency": "P1D",
22+
"queryPeriod": "P1D",
23+
"triggerOperator": "GreaterThan",
24+
"triggerThreshold": 0,
25+
"displayName": "Changes to Amazon VPC settings",
26+
"description": "This alert monitors changes to Amazon VPC (Virtual Private Cloud) settings such as new ACL entries and routes in route tables.\nMore information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255 \nand https://aws.amazon.com/vpc/",
27+
"tactics": [
28+
"PrivilegeEscalation",
29+
"LateralMovement"
30+
],
31+
"createdDateUTC": "2019-02-27T00:00:00Z",
32+
"status": "Available",
33+
"requiredDataConnectors": [
34+
{
35+
"connectorId": "AWS",
36+
"dataTypes": [
37+
"AWSCloudTrail"
38+
]
39+
}
40+
],
41+
"alertRulesCreatedByTemplateCount": 0
42+
}
43+
},
44+
{
45+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/AlertRuleTemplates/f71aba3d-28fb-450b-b192-4e76a83015c8",
46+
"name": "f71aba3d-28fb-450b-b192-4e76a83015c8",
47+
"type": "Microsoft.SecurityInsights/AlertRuleTemplates",
48+
"kind": "Fusion",
49+
"properties": {
50+
"displayName": "Advanced Multi-Stage Attack Detection",
51+
"description": "Place holder: Fusion uses graph powered machine learning algorithms to correlate between millions of lower fidelity anomalous activities from different products such as Azure AD Identity Protection, and Microsoft Cloud App Security, to combine them into a manageable number of interesting security cases.\n",
52+
"tactics": [
53+
"Persistence",
54+
"LateralMovement",
55+
"Exfiltration",
56+
"CommandAndControl"
57+
],
58+
"createdDateUTC": "2019-07-25T00:00:00Z",
59+
"status": "Available",
60+
"severity": "High",
61+
"alertRulesCreatedByTemplateCount": 0
62+
}
63+
},
64+
{
65+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/AlertRuleTemplates/b3cfc7c0-092c-481c-a55b-34a3979758cb",
66+
"name": "b3cfc7c0-092c-481c-a55b-34a3979758cb",
67+
"type": "Microsoft.SecurityInsights/AlertRuleTemplates",
68+
"kind": "MicrosoftSecurityIncidentCreation",
69+
"properties": {
70+
"productFilter": "Microsoft Cloud App Security",
71+
"displayName": "Create incidents based on Microsoft Cloud App Security alerts",
72+
"description": "Create incidents based on all alerts generated in Microsoft Cloud App Security",
73+
"createdDateUTC": "2019-07-16T00:00:00Z",
74+
"status": "Available",
75+
"alertRulesCreatedByTemplateCount": 0
76+
}
77+
}
78+
]
79+
}
80+
}
81+
}
82+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"parameters": {
3+
"api-version": "2021-10-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalInsights",
8+
"ruleId": "myFirstFusionRule",
9+
"alertRule": {
10+
"kind": "Fusion",
11+
"etag": "3d00c3ca-0000-0100-0000-5d42d5010000",
12+
"properties": {
13+
"enabled": true,
14+
"alertRuleTemplateName": "f71aba3d-28fb-450b-b192-4e76a83015c8"
15+
}
16+
}
17+
},
18+
"responses": {
19+
"200": {
20+
"body": {
21+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRules/myFirstFusionRule",
22+
"name": "myFirstFusionRule",
23+
"etag": "\"260090e2-0000-0d00-0000-5d6fb8670000\"",
24+
"type": "Microsoft.SecurityInsights/alertRules",
25+
"kind": "Fusion",
26+
"properties": {
27+
"displayName": "Advanced Multi-Stage Attack Detection",
28+
"description": "In this mode, Sentinel combines low fidelity alerts, which themselves may not be actionable, and events across multiple products, into high fidelity security interesting incidents. The system looks at multiple products to produce actionable incidents. Custom tailored to each tenant, Fusion not only reduces false positive rates but also can detect attacks with limited or missing information. \nIncidents generated by Fusion system will encase two or more alerts. By design, Fusion incidents are low volume, high fidelity and will be high severity, which is why Fusion is turned ON by default in Azure Sentinel.\n\nFor Fusion to work, please configure the following data sources in Data Connectors tab:\nRequired - Azure Active Directory Identity Protection\nRequired - Microsoft Cloud App Security\nIf Available - Palo Alto Network\n\nFor full list of scenarios covered by Fusion, and detail instructions on how to configure the required data sources, go to aka.ms/SentinelFusion",
29+
"alertRuleTemplateName": "f71aba3d-28fb-450b-b192-4e76a83015c8",
30+
"tactics": [
31+
"Persistence",
32+
"LateralMovement",
33+
"Exfiltration",
34+
"CommandAndControl"
35+
],
36+
"severity": "High",
37+
"enabled": true,
38+
"lastModifiedUtc": "2019-09-04T13:13:11.5340061Z"
39+
}
40+
}
41+
},
42+
"201": {
43+
"body": {
44+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRules/myFirstFusionRule",
45+
"name": "myFirstFusionRule",
46+
"etag": "\"260090e2-0000-0d00-0000-5d6fb8670000\"",
47+
"type": "Microsoft.SecurityInsights/alertRules",
48+
"kind": "Fusion",
49+
"properties": {
50+
"displayName": "Advanced Multi-Stage Attack Detection",
51+
"description": "In this mode, Sentinel combines low fidelity alerts, which themselves may not be actionable, and events across multiple products, into high fidelity security interesting incidents. The system looks at multiple products to produce actionable incidents. Custom tailored to each tenant, Fusion not only reduces false positive rates but also can detect attacks with limited or missing information. \nIncidents generated by Fusion system will encase two or more alerts. By design, Fusion incidents are low volume, high fidelity and will be high severity, which is why Fusion is turned ON by default in Azure Sentinel.\n\nFor Fusion to work, please configure the following data sources in Data Connectors tab:\nRequired - Azure Active Directory Identity Protection\nRequired - Microsoft Cloud App Security\nIf Available - Palo Alto Network\n\nFor full list of scenarios covered by Fusion, and detail instructions on how to configure the required data sources, go to aka.ms/SentinelFusion",
52+
"alertRuleTemplateName": "f71aba3d-28fb-450b-b192-4e76a83015c8",
53+
"tactics": [
54+
"Persistence",
55+
"LateralMovement",
56+
"Exfiltration",
57+
"CommandAndControl"
58+
],
59+
"severity": "High",
60+
"enabled": true,
61+
"lastModifiedUtc": "2019-09-04T13:13:11.5340061Z"
62+
}
63+
}
64+
}
65+
}
66+
}

0 commit comments

Comments
 (0)