Azure-Sentinel icon indicating copy to clipboard operation
Azure-Sentinel copied to clipboard

Analytic rule "TI map Domain entity to Web Session Events (ASIM Web Session schema)" not processing Url

Open cg-techgw opened this issue 1 month ago • 3 comments

Describe the bug The rule "TI map Domain entity to Web Session Events (ASIM Web Session schema)" in the file https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Threat%20Intelligence%20(NEW)/Analytic%20Rules/DomainEntity_imWebSession.yaml

Appears to have been written to map Threat Intel items of type url:value or domain-name:* however the placement of a where clause means it will only process items of type domain-name:*

Reduces the effectiveness of this rule very significantly as a lot of IOC may rely on a full URL path rather than just the FQDN

To Reproduce Steps to reproduce the behavior: Go to: https://github.com/Azure/Azure-Sentinel/blob/aaca33fc6e4cf5fa1560b410aae3525cc241419e/Solutions/Threat%20Intelligence%20(NEW)/Analytic%20Rules/DomainEntity_imWebSession.yaml#L38 Copy lines 1-11 of the query only (31-42 of the yaml file) and run in a Sentinel instance that is configured to have populated the ThreatIntelIndicators table with indicators of both type "url:value" and "domain-name:value"

Expected behavior Query should return indicators of type "url:value" or "domain-name", but it only returns those of type "domain-name"

cg-techgw avatar Dec 04 '25 13:12 cg-techgw

Hello @cg-techgw, thanks for flagging this. We will look into it and get back to you. Thanks!

v-utpalkumar avatar Dec 05 '25 04:12 v-utpalkumar

After a bit more thinking, this might just be a messy usage of the TI. I initially presumed the URL indicators ought to be included as they are incorrectly referenced in the rule (hence the related pull request), but they are really a different sort of indicator than domains so perhaps they are not appropriate for this rule.

So my question would be: is the best course of action to,

A: Include indicators of the URL type in this rule by extracting the domain portion for comparison against the WebSession logs, or B: Exclude URL type indicators from this rule and just add a new one which compares them against WebSession logs instead.

My inclination is option B as it seems like the obvious place to check URL indicators anyway, and there's always a possibility that URL indicators contain a benign domain with a malicious URL path. but perhaps I'm missing something about the way the TI is used?

Can someone from the content creation team comment?

cg-techgw avatar Dec 16 '25 10:12 cg-techgw

Hello @cg-techgw,

Yes, combining both domain and URL indicator-based IOCs within a single rule can introduce complexity. Kindly create a separate rule specifically for URL-based IOC. Thank you for your cooperation!

v-utpalkumar avatar Dec 17 '25 13:12 v-utpalkumar