|
137 | 137 | "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','93641436-afb3-4921-8828-ceab0d15aaab','-', '1.0.0')))]" |
138 | 138 | }, |
139 | 139 | "analyticRuleObject2": { |
140 | | - "analyticRuleVersion2": "1.0.0", |
| 140 | + "analyticRuleVersion2": "1.0.1", |
141 | 141 | "_analyticRulecontentId2": "c1c6ba64-134e-403b-b9a6-1bebc90809a4", |
142 | 142 | "analyticRuleId2": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', 'c1c6ba64-134e-403b-b9a6-1bebc90809a4')]", |
143 | 143 | "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring('c1c6ba64-134e-403b-b9a6-1bebc90809a4')))]", |
144 | | - "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','c1c6ba64-134e-403b-b9a6-1bebc90809a4','-', '1.0.0')))]" |
| 144 | + "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','c1c6ba64-134e-403b-b9a6-1bebc90809a4','-', '1.0.1')))]" |
145 | 145 | }, |
146 | 146 | "analyticRuleObject3": { |
147 | 147 | "analyticRuleVersion3": "1.0.0", |
|
874 | 874 | "aggregationKind": "AlertPerResult" |
875 | 875 | }, |
876 | 876 | "alertDetailsOverride": { |
877 | | - "alertDescriptionFormat": "WAF Alert Confirmed {{result_s}} by Contrast ADR on {{request_headers_referer_s}} endpoint of {{application_name_s}} ", |
878 | | - "alertDisplayNameFormat": "WAF Alert Confirmed {{result_s}} by Contrast ADR on {{request_headers_referer_s}} endpoint of {{application_name_s}} " |
| 877 | + "alertDisplayNameFormat": "WAF Alert Confirmed {{result_s}} by Contrast ADR on {{request_headers_referer_s}} endpoint of {{application_name_s}} ", |
| 878 | + "alertDescriptionFormat": "WAF Alert Confirmed {{result_s}} by Contrast ADR on {{request_headers_referer_s}} endpoint of {{application_name_s}} " |
879 | 879 | }, |
880 | 880 | "incidentConfiguration": { |
881 | 881 | "createIncident": true, |
882 | 882 | "groupingConfiguration": { |
883 | | - "enabled": true, |
884 | | - "reopenClosedIncident": false, |
885 | 883 | "matchingMethod": "Selected", |
| 884 | + "reopenClosedIncident": false, |
| 885 | + "enabled": true, |
886 | 886 | "lookbackDuration": "PT1H" |
887 | 887 | } |
888 | 888 | } |
|
954 | 954 | "description": "Correlates Contrast ADR incidents with specific high-risk attack patterns including command injection, deserialization attacks, and file upload vulnerabilities. This rule identifies confirmed security events that require immediate attention from security teams.", |
955 | 955 | "displayName": "Contrast ADR - EDR Alert Correlation", |
956 | 956 | "enabled": false, |
957 | | - "query": "ContrastADRIncident_CL\n| project-rename incident_id_s = incidentId_s\n| join kind=inner (ContrastADR_CL | where rule_s in~(\"class-loader-manipulation\", \"cmd-injection-semantic-chained-commands\", \"cmd-injection-semantic-dangerous-paths\", \"cmd-injection-command-backdoors\", \"cmd-injection-process-hardening\", \"cmd-injection\", \"expression-language-injection\", \"jndi-injection\", \"ssjs-injection\", \"unsafe-file-upload\", \"untrusted-deserialization\",\"xxe\")) on incident_id_s\n| project-rename hostname_s = host_hostname_s\n//Please add your EDR table name in place of ContrastWAFLogs_CL and hostname's column name in place of hostname_s below and uncomment the queries below\n//| join kind = inner ( ContrastWAFLogs_CL\n//| where TimeGenerated >= ago(5m)) on hostname_s\n", |
| 957 | + "query": "ContrastADRIncident_CL\n| join kind=inner (ContrastADR_CL | where rule_s in~(\"class-loader-manipulation\", \"cmd-injection-semantic-chained-commands\", \"cmd-injection-semantic-dangerous-paths\", \"cmd-injection-command-backdoors\", \"cmd-injection-process-hardening\", \"cmd-injection\", \"expression-language-injection\", \"jndi-injection\", \"ssjs-injection\", \"unsafe-file-upload\", \"untrusted-deserialization\",\"xxe\") | project-rename hostname_s = host_hostname_s) on incidentId_s\n//Please add your EDR table name in place of ContrastWAFLogs_CL and hostname's column name in place of hostname_s below and uncomment the queries below\n//| join kind = inner ( ContrastWAFLogs_CL\n//| where TimeGenerated >= ago(5m)) on hostname_s\n", |
958 | 958 | "queryFrequency": "PT5M", |
959 | 959 | "queryPeriod": "PT5M", |
960 | 960 | "severity": "Medium", |
|
999 | 999 | "aggregationKind": "AlertPerResult" |
1000 | 1000 | }, |
1001 | 1001 | "alertDetailsOverride": { |
1002 | | - "alertDescriptionFormat": "EDR Alert Confirmed {{result_s}} by Contrast ADR on {{application_name_s}}", |
1003 | | - "alertDisplayNameFormat": "EDR Alert Confirmed {{result_s}} by Contrast ADR on {{application_name_s}}" |
| 1002 | + "alertDisplayNameFormat": "EDR Alert Confirmed {{result_s}} by Contrast ADR on {{application_name_s}}", |
| 1003 | + "alertDescriptionFormat": "EDR Alert Confirmed {{result_s}} by Contrast ADR on {{application_name_s}}" |
1004 | 1004 | }, |
1005 | 1005 | "incidentConfiguration": { |
1006 | 1006 | "createIncident": true, |
1007 | 1007 | "groupingConfiguration": { |
1008 | | - "enabled": true, |
1009 | | - "reopenClosedIncident": false, |
1010 | 1008 | "matchingMethod": "Selected", |
1011 | | - "lookbackDuration": "PT1H", |
1012 | 1009 | "groupByEntities": [ |
1013 | 1010 | "Host" |
1014 | | - ] |
| 1011 | + ], |
| 1012 | + "reopenClosedIncident": false, |
| 1013 | + "enabled": true, |
| 1014 | + "lookbackDuration": "PT1H" |
1015 | 1015 | } |
1016 | 1016 | } |
1017 | 1017 | } |
|
1137 | 1137 | "aggregationKind": "AlertPerResult" |
1138 | 1138 | }, |
1139 | 1139 | "alertDetailsOverride": { |
1140 | | - "alertDescriptionFormat": "{{result_s}} on {{request_headers_referer_s}} endpoint of {{application_name_s}} ", |
1141 | | - "alertDisplayNameFormat": "{{result_s}} {{rule_s}} from {{SourceIP}} in Production" |
| 1140 | + "alertDisplayNameFormat": "{{result_s}} {{rule_s}} from {{SourceIP}} in Production", |
| 1141 | + "alertDescriptionFormat": "{{result_s}} on {{request_headers_referer_s}} endpoint of {{application_name_s}} " |
1142 | 1142 | }, |
1143 | 1143 | "incidentConfiguration": { |
1144 | 1144 | "createIncident": true, |
1145 | 1145 | "groupingConfiguration": { |
1146 | | - "enabled": true, |
1147 | | - "reopenClosedIncident": false, |
1148 | 1146 | "matchingMethod": "Selected", |
1149 | | - "lookbackDuration": "PT30M", |
1150 | 1147 | "groupByEntities": [ |
1151 | 1148 | "IP", |
1152 | 1149 | "Host" |
1153 | | - ] |
| 1150 | + ], |
| 1151 | + "reopenClosedIncident": false, |
| 1152 | + "enabled": true, |
| 1153 | + "lookbackDuration": "PT30M" |
1154 | 1154 | } |
1155 | 1155 | } |
1156 | 1156 | } |
|
1277 | 1277 | }, |
1278 | 1278 | "customDetails": { |
1279 | 1279 | "TargetHost": "host_hostname_s", |
1280 | | - "AttackRule": "rule_s", |
| 1280 | + "AttackResult": "result_s", |
1281 | 1281 | "ApplicationName": "application_name_s", |
| 1282 | + "Environment": "environment_s", |
1282 | 1283 | "AttackedEndpoint": "request_headers_referer_s", |
1283 | | - "AttackResult": "result_s", |
1284 | | - "Environment": "environment_s" |
| 1284 | + "AttackRule": "rule_s" |
1285 | 1285 | }, |
1286 | 1286 | "alertDetailsOverride": { |
1287 | | - "alertDescriptionFormat": "{{result_s}} on {{request_headers_referer_s}} endpoint of {{application_name_s}} ", |
1288 | | - "alertDisplayNameFormat": "{{result_s}} {{rule_s}} from {{SourceIP}} " |
| 1287 | + "alertDisplayNameFormat": "{{result_s}} {{rule_s}} from {{SourceIP}} ", |
| 1288 | + "alertDescriptionFormat": "{{result_s}} on {{request_headers_referer_s}} endpoint of {{application_name_s}} " |
1289 | 1289 | }, |
1290 | 1290 | "incidentConfiguration": { |
1291 | 1291 | "createIncident": true, |
1292 | 1292 | "groupingConfiguration": { |
1293 | | - "enabled": true, |
1294 | | - "reopenClosedIncident": false, |
1295 | 1293 | "matchingMethod": "Selected", |
1296 | | - "lookbackDuration": "PT1H", |
1297 | 1294 | "groupByEntities": [ |
1298 | 1295 | "IP", |
1299 | 1296 | "Host" |
1300 | | - ] |
| 1297 | + ], |
| 1298 | + "reopenClosedIncident": false, |
| 1299 | + "enabled": true, |
| 1300 | + "lookbackDuration": "PT1H" |
1301 | 1301 | } |
1302 | 1302 | } |
1303 | 1303 | } |
|
1432 | 1432 | "aggregationKind": "AlertPerResult" |
1433 | 1433 | }, |
1434 | 1434 | "alertDetailsOverride": { |
1435 | | - "alertDescriptionFormat": "Confirmed active SQL Injection by Contrast ADR on {{request_headers_referer_s}} endpoint of {{application_name_s}} ", |
1436 | | - "alertDisplayNameFormat": "Confirmed active SQL Injection by Contrast ADR on {{request_headers_referer_s}} endpoint of {{application_name_s}} " |
| 1435 | + "alertDisplayNameFormat": "Confirmed active SQL Injection by Contrast ADR on {{request_headers_referer_s}} endpoint of {{application_name_s}} ", |
| 1436 | + "alertDescriptionFormat": "Confirmed active SQL Injection by Contrast ADR on {{request_headers_referer_s}} endpoint of {{application_name_s}} " |
1437 | 1437 | }, |
1438 | 1438 | "incidentConfiguration": { |
1439 | 1439 | "createIncident": true, |
1440 | 1440 | "groupingConfiguration": { |
1441 | | - "enabled": true, |
1442 | | - "reopenClosedIncident": false, |
1443 | 1441 | "matchingMethod": "Selected", |
1444 | | - "lookbackDuration": "PT30M", |
1445 | 1442 | "groupByEntities": [ |
1446 | 1443 | "Host", |
1447 | 1444 | "IP" |
1448 | | - ] |
| 1445 | + ], |
| 1446 | + "reopenClosedIncident": false, |
| 1447 | + "enabled": true, |
| 1448 | + "lookbackDuration": "PT30M" |
1449 | 1449 | } |
1450 | 1450 | } |
1451 | 1451 | } |
|
1560 | 1560 | "aggregationKind": "AlertPerResult" |
1561 | 1561 | }, |
1562 | 1562 | "alertDetailsOverride": { |
1563 | | - "alertDescriptionFormat": "{{summary_s}}", |
1564 | | - "alertDisplayNameFormat": "{{incidentName_s}}" |
| 1563 | + "alertDisplayNameFormat": "{{incidentName_s}}", |
| 1564 | + "alertDescriptionFormat": "{{summary_s}}" |
1565 | 1565 | }, |
1566 | 1566 | "incidentConfiguration": { |
1567 | 1567 | "createIncident": true, |
1568 | 1568 | "groupingConfiguration": { |
1569 | | - "enabled": true, |
1570 | | - "reopenClosedIncident": false, |
1571 | 1569 | "matchingMethod": "Selected", |
1572 | | - "lookbackDuration": "PT1H", |
1573 | 1570 | "groupByCustomDetails": [ |
1574 | 1571 | "IncidentId", |
1575 | 1572 | "ApplicationName" |
1576 | | - ] |
| 1573 | + ], |
| 1574 | + "reopenClosedIncident": false, |
| 1575 | + "enabled": true, |
| 1576 | + "lookbackDuration": "PT1H" |
1577 | 1577 | } |
1578 | 1578 | } |
1579 | 1579 | } |
|
0 commit comments