How to determine where an alert rule comes from?

Iron Contributor

Okay, I'm getting incidents with the description "Sign-in from an atypical location based on the user's recent sign-ins". In the incident, I can see that the Analytics rule is "Create incidents based on Azure Active Directory Identity Protection". I then went to Analytics where I can see the rule under "Active rules" and it's listed twice - once as Gallery Content and once as Custom Content. But I can't tell how either of these rules got into Sentinel. Is there a way to track where they came from? Especially the one labelled "Gallery content" seems like I should be able to tell the content source or find it in the Content Hub.

TIA

~dgm~

3 Replies

You should be able to click on the link for Analytics Rule in the info pane. This will take you directly to the Analytics Rule that generated the Incident.

 

clickhere.png

@Rod_Trent 

Yes, it takes me to the rule but I want to know where the rule came from - which content from the Content Hub included that rule such that it ended up imported into this environment. Unlike most of the other Analytics Rules, this one only shows on the 'Active rules' tab, not on the "Rule templates" tab. What I want to do is end up with this rule (and maybe any associated conent) imported into a Sentinel test environment.

In Rod's screen shot you can see that the Alert has come from Microsoft Defender for Cloud (and Azure Security Center, which is the legacy name for that product).
Rules from other products like Defender for Cloud or Defender for Endpoint are not stored in Microsoft Sentinel - the product Source column is useful in this situation (if its not Microsoft Sentinel then you typically wont see the rule template).

You are getting these Alerts because you enabled an individual Defender connector or the Microsoft 365 Defender connector. The rules called "Create incidents based on ..." are not used by the Microsoft 365 Defender connector.