|
6 | 6 | "config": { |
7 | 7 | "isWizard": false, |
8 | 8 | "basics": { |
9 | | - "description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\"height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/UEBA%20Essentials/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Microsoft Sentinel UEBA content package will provide you with various queries based on UEBA tables, that allows you to hunt for tailored threat scenarios. You'll be able to investigate and search for anomalous activities over UEBA's enriched data, and get inspired to customize queries according to your own use-cases.\n\n**Important :** Some of the queries that are part of this solution, make use of [Built-in Watchlist Templates](https://docs.microsoft.com/azure/sentinel/watchlist-schemas) and will not work unless the corresponding watchlist is created. Other queries may requires changes to match your environment details.\n\n**Hunting Queries:** 25\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", |
| 9 | + "description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\"height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/UEBA%20Essentials/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Microsoft Sentinel UEBA content package will provide you with various queries based on UEBA tables, that allows you to hunt for tailored threat scenarios. You'll be able to investigate and search for anomalous activities over UEBA's enriched data, and get inspired to customize queries according to your own use-cases.\n\n**Important :** Some of the queries that are part of this solution, make use of [Built-in Watchlist Templates](https://docs.microsoft.com/azure/sentinel/watchlist-schemas) and will not work unless the corresponding watchlist is created. Other queries may requires changes to match your environment details.\n\n**Hunting Queries:** 30\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", |
10 | 10 | "subscription": { |
11 | 11 | "resourceProviders": [ |
12 | 12 | "Microsoft.OperationsManagement/solutions", |
|
422 | 422 | } |
423 | 423 | } |
424 | 424 | ] |
| 425 | + }, |
| 426 | + { |
| 427 | + "name": "huntingquery26", |
| 428 | + "type": "Microsoft.Common.Section", |
| 429 | + "label": "Anomalous High-Score Activity Triage", |
| 430 | + "elements": [ |
| 431 | + { |
| 432 | + "name": "huntingquery26-text", |
| 433 | + "type": "Microsoft.Common.TextBlock", |
| 434 | + "options": { |
| 435 | + "text": "Identify the highest-scoring anomalies for rapid triage using Anomalies Table. This hunting query depends on BehaviorAnalytics data connector (Anomalies Parser or Table)" |
| 436 | + } |
| 437 | + } |
| 438 | + ] |
| 439 | + }, |
| 440 | + { |
| 441 | + "name": "huntingquery27", |
| 442 | + "type": "Microsoft.Common.Section", |
| 443 | + "label": "Anomaly Template Distribution by Tactics and Techniques", |
| 444 | + "elements": [ |
| 445 | + { |
| 446 | + "name": "huntingquery27-text", |
| 447 | + "type": "Microsoft.Common.TextBlock", |
| 448 | + "options": { |
| 449 | + "text": "Provides a statistical overview of anomaly detections over the past 30 days, grouped by template name, MITRE ATT&CK tactics, and techniques. Use this query to identify the most frequently triggered anomaly patterns and their associated threat techniques for trend analysis and detection tuning. This hunting query depends on BehaviorAnalytics data connector (Anomalies Parser or Table)" |
| 450 | + } |
| 451 | + } |
| 452 | + ] |
| 453 | + }, |
| 454 | + { |
| 455 | + "name": "huntingquery28", |
| 456 | + "type": "Microsoft.Common.Section", |
| 457 | + "label": "User-Centric Anomaly Investigation", |
| 458 | + "elements": [ |
| 459 | + { |
| 460 | + "name": "huntingquery28-text", |
| 461 | + "type": "Microsoft.Common.TextBlock", |
| 462 | + "options": { |
| 463 | + "text": "Investigates all anomalous activities associated with a specific user account over the past 30 days, including anomaly scores, behavioral insights, source locations, and MITRE ATT&CK mappings. Customize by replacing \"[email protected]\" with the target user principal name for focused threat hunting and incident response. This hunting query depends on BehaviorAnalytics data connector (Anomalies Parser or Table)" |
| 464 | + } |
| 465 | + } |
| 466 | + ] |
| 467 | + }, |
| 468 | + { |
| 469 | + "name": "huntingquery29", |
| 470 | + "type": "Microsoft.Common.Section", |
| 471 | + "label": "Anomaly Detection Trend Analysis", |
| 472 | + "elements": [ |
| 473 | + { |
| 474 | + "name": "huntingquery29-text", |
| 475 | + "type": "Microsoft.Common.TextBlock", |
| 476 | + "options": { |
| 477 | + "text": "Visualizes anomaly detection trends over the past 90 days, showing daily counts of triggered anomaly templates. Use this time-series chart to identify patterns, spikes in anomalous behavior, and seasonal trends for baseline establishment and threat hunting prioritization. This hunting query depends on BehaviorAnalytics data connector (Anomalies Parser or Table)" |
| 478 | + } |
| 479 | + } |
| 480 | + ] |
| 481 | + }, |
| 482 | + { |
| 483 | + "name": "huntingquery30", |
| 484 | + "type": "Microsoft.Common.Section", |
| 485 | + "label": "Top Anomalous Source IP Triage", |
| 486 | + "elements": [ |
| 487 | + { |
| 488 | + "name": "huntingquery30-text", |
| 489 | + "type": "Microsoft.Common.TextBlock", |
| 490 | + "options": { |
| 491 | + "text": "Identifies the top source IP addresses with multiple distinct anomaly templates over the past 30 days (excluding single noisy hits), then surfaces their most recent (last 24h) high-fidelity anomalous activities for focused investigation, including scores, tactics, techniques, and behavioral insights. This hunting query depends on BehaviorAnalytics data connector (Anomalies Parser or Table)" |
| 492 | + } |
| 493 | + } |
| 494 | + ] |
425 | 495 | } |
426 | 496 | ] |
427 | 497 | } |
|
0 commit comments