-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
invalid formatting for analytics rule "Multiple RDP connections from Single System" #9376
Comments
Thank you for submitting an Issue to the Azure Sentinel GitHub repo! You should expect an initial response to your Issue from the team within 5 business days. Note that this response may be delayed during holiday periods. For urgent, production-affecting issues please raise a support ticket via the Azure Portal. |
Hi @HoGerl , Thanks for flagging this issue, we will investigate this issue and get back to you with some updates by 17Nov23. Thanks |
Hi @HoGerl ,I am having the following queries i.e. we are using project/extend /summarize on account & join on account and we don't have exact data to replicate the issue, Could you please share screen shot of the no records for the query and also share sample data, so we check the query for both the tables i.e. security event and windows event. |
Hi @HoGerl , Gentle Reminder: We are waiting for your response on this issue, could you please share the details of the above queries, Thanks. |
Hi @HoGerl , Gentle Reminder: We are waiting for your response on this issue. If you still need to keep this issue active, please respond to it in the next 2 days i.e. 25Nov23. If we don't receive response by the given date, we will close this issue. |
Hi @v-muuppugund, maybe i can help out here, since we are experiencing the same issues. To address this, i crafted a custom KQL datatable with pseudo data from the "SecurityEvent" table.
Similarly, this can also be done with the "WindowsEvent" table, but since the issue is the same I am only showing you the effect for the "SecurityEvent" table. To test the query mentioned by @HoGerl I needed to change some things:
Things i changed are:
For TimeRange = Set in Query, we will get If we change Lince 35 from the original query from As I said, the same can be done with the "WindowsEvent" table with the same change in line 49. To sum up, the changes i did are just so that you can test the modified query for yourself, the only changes that need to be done are changing lines 35 and 49 accordingly to "fix" the query. |
Hi @kllnbrnjn, Thanks for sharing the information, we will check on this and get back to you by - 30 Nov. 2023 |
Hey @v-sudkharat, any updates on this topic? |
Hi @HoGerl / @kllnbrnjn , If needed we can have a call, please share your convenient time slots and email id,so will discuss in detail. |
Hi @HoGerl / @kllnbrnjn , Gentle reminder , If needed we can have a call, please share your convenient time slots and email id,so will discuss in detail. or else share sample data to v-muuppugund@microsoft.com |
hej hej, for the first point, @kllnbrnjn showed up how to test it, i think. |
Hi @HoGerl ,Will cross check on it and get back to you. |
Hi @HoGerl /@kllnbrnjn ,I am able to replicate the issue, didn't check above sample table, as don't have data, Will be doing the changes and raising a PR. |
Hi @HoGerl / @kllnbrnjn ,I have done the changes and will be working on internal review for those changes,will update you once PR merged. |
Describe the bug
actually the rule does not work like expected, since the account mapping does not work, if there are upper cases in it.
To Reproduce
Steps to reproduce the behavior:
lines to fix:
Expected behavior
the account mapping works
Screenshots
none.
Additional context
[related analytics rule] (https://github.com/Azure/Azure-Sentinel/blob/master/Detections/SecurityEvent/RDP_MultipleConnectionsFromSingleSystem.yaml)
The text was updated successfully, but these errors were encountered: