Skip to content

Commit 45e8624

Browse files
authored
Merge pull request Azure#13108 from Azure/v-sudkharat/BussinessEmailReport-
Update analytic rule alert description and version
2 parents d6122ef + 728f5d4 commit 45e8624

File tree

5 files changed

+55
-54
lines changed

5 files changed

+55
-54
lines changed

Solutions/Business Email Compromise - Financial Fraud/Analytic Rules/SuspiciousAccessOfBECRelatedDocuments.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -80,9 +80,9 @@ customDetails:
8080
Product: EventProduct
8181
UserAgent: HttpUserAgent
8282
alertDetailsOverride:
83-
alertDisplayNameFormat: Suspicious access of {{number_of_files_accessed}} BEC related documents by {{User}}
83+
alertDisplayNameFormat: Suspicious access of {{CountOfDocs}} BEC related documents by {{User}}
8484
alertDescriptionFormat: |
85-
This query looks for users (in this case {{User}}) with suspicious spikes in the number of files accessed (in this case {{number_of_files_accessed}} events) that relate to topics commonly accessed as part of Business Email Compromise (BEC) attacks. The query looks for access to files in storage that relate to topics such as invoices or payments, and then looks for users accessing these files in significantly higher numbers than in the previous 14 days. Incidents raised by this analytic should be investigated to see if the user accessing these files should be accessing them, and if the volume they accessed them at was related to a legitimate business need.
85+
This query looks for users (in this case {{User}}) with suspicious spikes in the number of files accessed (in this case {{CountOfDocs}} events) that relate to topics commonly accessed as part of Business Email Compromise (BEC) attacks. The query looks for access to files in storage that relate to topics such as invoices or payments, and then looks for users accessing these files in significantly higher numbers than in the previous 14 days. Incidents raised by this analytic should be investigated to see if the user accessing these files should be accessing them, and if the volume they accessed them at was related to a legitimate business need.
8686
This query contains thresholds to reduce the chance of false positives, these can be adjusted to suit individual environments. In addition false positives could be generated by legitimate, scheduled actions that occur less often than every 14 days, additional exclusions can be added for these actions on username or IP address entities. This query uses the imFileEvent schema from ASIM, you will first need to ensure you have ASIM deployed in your environment. Ref https://learn.microsoft.com/azure/sentinel/normalization-about-parsers
87-
version: 1.0.4
87+
version: 1.0.5
8888
kind: Scheduled

Solutions/Business Email Compromise - Financial Fraud/Data/Solution_Business Email Compromise - Financial Fraud.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,6 @@
3636
],
3737
"Metadata": "SolutionMetadata.json",
3838
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Business Email Compromise - Financial Fraud",
39-
"Version": "3.0.9",
39+
"Version": "3.0.10",
4040
"TemplateSpec": true
4141
}
Binary file not shown.

0 commit comments

Comments
 (0)