Detections/SecurityEvent/ExcessiveLogonFailures.yaml (5 lines of code) (raw):
id: d59a5634-e1c2-4a86-8b46-24011e94e2a7
name: Excessive Windows logon failures
description: |
'As part of content migration, this file is moved to new location. you can find here: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Windows%20Security%20Events/Analytic%20Rules/ExcessiveLogonFailures.yaml'
version: 2.0.1