/
NetBackup_many_Anomalies.yaml
38 lines (38 loc) · 1.15 KB
/
NetBackup_many_Anomalies.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
id: 2e0efcd4-56d2-41df-9098-d6898a58c62b
name: Alarming number of anomalies generated in NetBackup
description: This rule generates an incident when an alarming number of anomalies are generated in the last 15 minutes.
severity: Medium
status: Available
requiredDataConnectors: []
queryFrequency: 15m
queryPeriod: 15m
triggerOperator: gt
triggerThreshold: 0
tactics:
- Discovery
- CredentialAccess
techniques:
- T1110
- T1212
query: "NetBackupAlerts_CL\r\n| where Category contains \"ANOMALY_NEW\"\r\n| extend\
\ client = split(Message, \"client '\")[1]\r\n| extend clientName = split(client,\
\ \"'\")[0]\r\n| summarize Total=count() by tostring(clientName)\r\n| where\
\ Total >= 10"
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: clientName
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: false
lookbackDuration: PT5H
matchingMethod: AllEntities
reopenClosedIncident: false
suppressionDuration: PT5H
suppressionEnabled: false
eventGroupingSettings:
aggregationKind: SingleAlert
version: 1.0.0
kind: Scheduled