Skip to content

Addition of Sentinel analytics rule for Network firewall logs and proxy server logs #4

@Rajaravi99

Description

@Rajaravi99

Detection Rule Proposal

Summary

I wanted to suggest few good threat detection rule logics for on-premises firewall and proxy server logs.


Threat Scenario

Here are specific attack scenarios detected using these logs:

  • Malware and Command & Control (C2) Activity
  • Data Exfiltration
  • Privilege Escalation and Unauthorized Access
  • Insider Threats and Compliance Issues

Data Sources Required

  • commonsecuritylogs
  • Signinlogs
  • Azureactivitylogs

Status

  • Detection logic drafted
  • KQL tested in Sentinel
  • Ready to submit PR if approved

Additional Context

I am happy to implement this rule as a PR including:

  • KQL query
  • Metadata (severity, tactics, techniques)
  • ARM/YAML format as per repo standards

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions