
Summary
This detection rule is designed to identify the introduction of new applications into the environment via the Push Security logging system. The rule monitors specific log entries related to application creation and updates, triggering an alert when a new application is detected. Based on the configuration, the rule operates under an information severity level, meaning it provides insights about new application occurrences without indicating critical threats. The rule utilizes a deduplication period of 60 minutes and triggers when it captures at least one application creation log, ensuring that duplicates from quick successive events do not clutter alerts. The logs are structured to capture application details such as ID, ownership, type, approval status, and timestamps, enabling discernment of application lifecycle states. This particular rule is significant for maintaining visibility over application deployments, particularly in environments where application management is crucial to security and compliance standards.
Categories
- Cloud
- Application
- Endpoint
Data Sources
- Application Log
- User Account
Created: 2024-06-27