Skip to content

Latest commit

 

History

History
25 lines (23 loc) · 1.17 KB

pC_microsoftsentinelsk4alerttriggersuccessloganalyticscr.md

File metadata and controls

25 lines (23 loc) · 1.17 KB

Parser Content

{
Name = microsoft-sentinel-sk4-alert-trigger-success-loganalyticscr
  ParserVersion = v1.0.0
  Vendor = Microsoft
  Product = Azure Sentinel
  TimeFormat = "yyyy-MM-dd'T'HH:mm:ss.SSSSSSSZ"
  Conditions = [ """"productName":"Azure Sentinel"""", """"vendorName":"Microsoft"""", """"severity":"""", """"kind":"SecurityAlert"""" ]
  Fields=[
  """"timeGenerated":"({time}\d\d\d\d-\d\d-\d\dT\d\d:\d\d:\d\d.\d\d\d\d\d\d\dZ)""",
	""""severity":"({alert_severity}[^"]+)""""
	"""properties":\{"title":"({alert_name}[^"]+)"""
	"""incidentUrl":({malware_url}[^"]+)"""
	""""Query"*:"({additional_info}.+?)",""""
	""""Analytic Rule Name":"({rule_name}[^"]+)""",
	"""relatedEntities.+?"kind":"Account","properties":\s*\{.+?"friendlyName":"({email_address}([A-Za-z0-9]+[!#$%&'+\/=?^_`~.\-])*[A-Za-z0-9]+@({email_domain}[^\]\s"\\,;\|]+\.[^\]\s"\\,;\|]+))"""
	""""kind":"Ip","properties":\{"address":"({src_ip}((([0-9a-fA-F.]{0,4}):{1,2}){1,7}([0-9a-fA-F]){1,4})|(((25[0-5]|(2[0-4]|1\d|[0-9]|)\d)\.?\b){4}))(:({src_port}\d+))?"""
	""""workspaceInfo":.+?"ResourceGroupName":"({resource_group}[^"]+)"""
	""""workspaceInfo":.+?"SubscriptionId":"({subscription_id}[^"]+)"""
    ]


}