-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AI_Creation_Events #11754
AI_Creation_Events #11754
Conversation
Machine learning creation event
@microsoft-github-policy-service agree |
Hi @mgstate, the key 'ID' is not present in this analytic rule. Please add it to the rule. You can refer any rule from our repo. Thanks. |
Fixed Entity Mappings and modified kql based on mappings
I see - the appropriate modifications have been made @v-prasadboke @v-shukore |
sorry meant to put @v-shukore |
Machine learning creation event
Required items, please complete
Change(s):
Added a new detection rule for Azure Machine Learning Write Operations.
Updated the YAML configuration to include tactics and techniques relevant to potential rogue access or resource creation.
Reason for Change(s):
To monitor and investigate write operations on Azure Machine Learning resources, ensuring that any unauthorized access or resource creation is detected.
Resolves ISSUE #1234 (if applicable).
Version Updated:
Yes
Detections/Analytic Rule templates are required to have the version updated.
Testing Completed:
Yes
The code has been tested in a Microsoft Sentinel environment to validate syntax and execution.
Checked that the validations are passing and have addressed any issues that are present:
Yes