You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
'Detects unusual spikes in SOCRadar alarm volume that may indicate an active campaign, coordinated attack, or data breach. Triggers when alarm count in the last hour exceeds the 7-day hourly average by more than 3x.'
5
+
severity: Medium
6
+
status: Available
7
+
requiredDataConnectors: []
8
+
queryFrequency: 1h
9
+
queryPeriod: 7d
10
+
triggerOperator: gt
11
+
triggerThreshold: 0
12
+
tactics:
13
+
- Impact
14
+
- Exfiltration
15
+
relevantTechniques:
16
+
- T1485
17
+
- T1567
18
+
query: |
19
+
let baseline = SOCRadar_Alarms_CL
20
+
| where TimeGenerated > ago(7d) and TimeGenerated < ago(1h)
21
+
| summarize AvgHourly = count() / 168.0;
22
+
let recent = SOCRadar_Alarms_CL
23
+
| where TimeGenerated > ago(1h)
24
+
| summarize RecentCount = count() by AlarmMainType;
25
+
recent
26
+
| extend BaselineAvg = toscalar(baseline)
27
+
| where RecentCount > (BaselineAvg * 3) and RecentCount > 5
'Detects SOCRadar alarms with High or Critical severity levels that require immediate attention. These alarms typically indicate active threats such as credential exposure, ransomware mentions, or targeted attacks against the organization.'
'Detects Microsoft Sentinel incidents tagged as SOCRadar that were closed more than 30 minutes ago but do not have the Synced tag. This may indicate the SOCRadar-Alarm-Sync playbook has failed to update the SOCRadar platform with the closure status.'
0 commit comments