Conversation
|
Hello how are you I am GitHub bot |
…ithub.com/Azure/Azure-Sentinel into v-utpal_Creating_AnalyticRule_for_URL_IOC
|
Test Screenshots Document: Threat_Intelligence_URL_WebSession.docx |
There was a problem hiding this comment.
Pull request overview
This PR introduces a new analytic rule for URL-based Indicator of Compromise (IOC) detection, complementing the existing domain-name IOC rule at customer request.
Changes:
- Added new analytic rule
URLEntity_imWebSession.yamlto detect malicious URLs in web session events using ASIM schema - Updated solution metadata to reflect the addition of the 52nd analytic rule
- Added release notes entry for version 3.0.14
Reviewed changes
Copilot reviewed 4 out of 6 changed files in this pull request and generated 2 comments.
| File | Description |
|---|---|
| Solutions/Threat Intelligence (NEW)/ReleaseNotes.md | Documents the addition of URL IOC analytic rule in version 3.0.14 |
| Solutions/Threat Intelligence (NEW)/Package/createUiDefinition.json | Updates UI definition to include the new analytic rule and increments total count to 52 |
| Solutions/Threat Intelligence (NEW)/Data/Solution_ThreatIntelligenceUpdated.json | Adds reference to the new URLEntity_imWebSession.yaml rule file |
| Solutions/Threat Intelligence (NEW)/Analytic Rules/URLEntity_imWebSession.yaml | New analytic rule file implementing URL IOC detection against web session events |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Solutions/Threat Intelligence (NEW)/Analytic Rules/URLEntity_imWebSession.yaml
Outdated
Show resolved
Hide resolved
rahul0216
left a comment
There was a problem hiding this comment.
Please address the inline comments.
Change(s):
Reason for Change(s):
Version Updated:
Testing Completed: Below is a summary of the testing performed, including the corresponding screenshots.