Illumio VEN Clone Detection Rule

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Create Microsoft Sentinel Incident When A Cloned Ven Is Detected

Attribute Value
Type Analytic Rule
Solution IllumioSaaS
ID b3c4b8f4-c12c-471e-9999-023c05852276
Severity High
Status Available
Kind Scheduled
Tactics DefenseEvasion
Techniques T1562
Required Connectors IllumioSaaSDataConnector, SyslogAma
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Illumio_Auditable_Events_CL ? ?
Syslog SyslogMessage has "illumio_pce/agent" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to IllumioSaaS