Skip to content

Added 5 new detections for Azure Firewall Sentinel Solution#13590

Closed
shabaz-github wants to merge 10 commits intoAzure:masterfrom
shabaz-github:master
Closed

Added 5 new detections for Azure Firewall Sentinel Solution#13590
shabaz-github wants to merge 10 commits intoAzure:masterfrom
shabaz-github:master

Conversation

@shabaz-github
Copy link
Contributor

Required items, please complete

Change(s):

  • Added the following 5 new detections for Azure Firewall Sentinel Solution
  • High severity malicious activity detected
  • Medium severity malicious activity detected
  • Web Application Attack detected
  • DDoS Attack detected
  • Elevation of Privilege attempt detected

Reason for Change(s):

  • To add more built-in detections to Azure Firewall Solution

Version Updated:

  • Yes

Testing Completed:

  • Yes

Checked that the validations are passing and have addressed any issues that are present:

  • Yes

Guidance <- remove section before submitting


Before submitting this PR please ensure that you have read the following sections and filled out the changes, reason for change and testing complete sections:

Thank you for your contribution to the Microsoft Sentinel Github repo.

Details of the code changes in your submitted PR. Providing descriptions for pull requests ensures there is context to changes being made and greatly enhances the code review process. Providing associated Issues that this resolves also easily connects the reason.

Change(s):

  • Updated syntax for XYZ.yaml

Reason for Change(s):

Version updated:

  • Yes
  • Detections/Analytic Rule templates are required to have the version updated

The code should have been tested in a Microsoft Sentinel environment that does not have any custom parsers, functions or tables, so that you validate no incorrect syntax and execution functions properly. If your submission requires a custom parser or function, it must be submitted with the PR.

Testing Completed:

  • Yes/No/Need Help

Note: If updating a detection, you must update the version field.

Before the submission has been made, please look at running the KQL and Yaml Validation Checks locally.
https://github.com/Azure/Azure-Sentinel#run-kql-validation-locally

Checked that the validations are passing and have addressed any issues that are present:

  • Yes/No/Need Help

Note: Let us know if you have tried fixing the validation error and need help.

References:


Added analytic rule for detecting high severity malicious activity in Azure Firewall IDPS logs.
Updated the analytic rule to identify medium severity malicious activity in Azure Firewall IDPS logs. Adjusted parameters such as time window, hit threshold, and categories of interest.
This analytic rule identifies web application attacks in Azure Firewall IDPS logs, with a focus on high severity incidents.
This analytic rule identifies DDoS attacks in Azure Firewall IDPS logs, providing details on severity, actions, and threat categories.
Updated the analytic rule to detect Elevation of Privilege attempts instead of DDoS attacks. Adjusted relevant fields and filters accordingly.
Increased the time window for DDoS attack detection from 30 days to 90 days.
@shabaz-github shabaz-github requested review from a team as code owners February 6, 2026 15:29
@shabaz-github
Copy link
Contributor Author

will submit another one

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant