Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Publisher | Microsoft Corporation |
| Support Tier | Microsoft |
| Support Link | https://support.microsoft.com |
| Categories | domains |
| Version | 3.0.1 |
| Author | Microsoft - support@microsoft.com |
| First Published | 2023-09-25 |
| Last Updated | 2023-09-25 |
| Solution Folder | Malware Protection Essentials |
| Marketplace | Azure Marketplace · Popularity: 🟡 Low (33%) |
| Pre-requisites | Amazon Web Services, Azure Firewall, Azure Network Security Groups, Check Point, CiscoASA, CiscoMeraki, Corelight, Fortinet FortiGate Next-Generation Firewall connector for Microsoft Sentinel, IoTOTThreatMonitoringwithDefenderforIoT, Microsoft Defender for Cloud, Microsoft Sysmon For Linux, Windows Firewall, PaloAlto-PAN-OS, Vectra AI Stream, Watchguard Firebox, zscaler1579058425289.zscaler_internet_access_mss |
Malware Protection Essentials is a domain solution and does not include any data connectors. The content in this solution requires one of the product solutions below , as well as any other connector or data source normalized to the ASIM.
For details on the required solutions, see the Pre-requisites section below.
Recommendation :-
It is highly recommended to use the Summarize data logic app playbook provided with this solution as it will significantly improve the performance of the Workbook, Analytic rules & Hunting queries.
This solution depends on 14 other solution(s):
This solution does not include its own data connectors but uses connectors from dependency solutions:
This solution includes 14 content item(s):
| Content Type | Count |
|---|---|
| Analytic Rules | 6 |
| Hunting Queries | 6 |
| Workbooks | 1 |
| Watchlists | 1 |
| Name | Severity | Tactics | Tables Used |
|---|---|---|---|
| Detect Malicious Usage of Recovery Tools to Delete Backup Files | High | Impact | - |
| Detect Print Processors Registry Driver Key Creation/Modification | Medium | Persistence, PrivilegeEscalation | - |
| Detect Registry Run Key Creation/Modification | Medium | Persistence, PrivilegeEscalation, DefenseEvasion | - |
| Detect Windows Allow Firewall Rule Addition/Modification | Medium | DefenseEvasion | - |
| Detect Windows Update Disabled from Registry | Medium | DefenseEvasion | - |
| Process Creation with Suspicious CommandLine Arguments | Medium | Execution, DefenseEvasion | - |
| Name | Tactics | Tables Used |
|---|---|---|
| Detect File Creation in Startup Folder | Persistence, PrivilegeEscalation, DefenseEvasion | - |
| Detect Files with Ramsomware Extensions | Execution, Impact | - |
| Detect Modification to System Files or Directories by User Accounts | DefenseEvasion, Persistence, PrivilegeEscalation | - |
| Detect New Scheduled Task Creation that Run Executables From Non-Standard Location | Execution, PrivilegeEscalation, Persistence | - |
| Detect New Scheduled Task Entry Creations | Execution, PrivilegeEscalation, Persistence | - |
| Executable Files Created in Uncommon Locations | Persistence, PrivilegeEscalation, DefenseEvasion | - |
| Name | Tables Used |
|---|---|
| MalwareProtectionEssentialsWorkbook | - |
| Name | Description | Tables Used |
|---|---|---|
| RansomwareFileExtensions | - | - |
| Version | Date Modified (DD-MM-YYYY) | Change History |
|---|---|---|
| 3.0.1 | 18-10-2024 | Analytical Rule [Process Creation with Suspicious CommandLine Arguments] |
| 3.0.0 | 21-12-2023 | Initial Solution Release |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊