GUIDES Core Threat Detection RevD
GUIDES Core Threat Detection RevD
Disclaimer
The information contained in this document is subject to change without notice. LogRhythm, Inc. makes no warranty
of any kind with respect to this information. LogRhythm, Inc. specifically disclaims the implied warranty of
merchantability and fitness for a particular purpose. LogRhythm, Inc. shall not be liable for any direct, indirect,
incidental, consequential, or other damages alleged in connection with the furnishing or use of this information.
Trademark
LogRhythm is a registered trademark of LogRhythm, Inc. All other company or product names mentioned may be
trademarks, registered trademarks, or service marks of their respective holders.
LogRhythm Inc.
4780 Pearl East Circle
Boulder, CO 80301
(303) 413-8745
www.logrhythm.com
This guide describes how to deploy the Core Threat Detection module. This module is a collection of fundamental AI
Engine rules that can be utilized to provide a balanced and basic level of security coverage with minimal configuration.
Additionally, this rule set can be used as an introduction to AI Engine rules before an organization begins moving on to
more complex and customizable rules. The full security modules themselves can be utilized for more comprehensive
insight into specific, targeted areas. This module contains content from the Core Threat Detection Module, the Network
Threat Detection Module, and the User Threat Detection Module. Refer to those Deployment Guides for more
information.
The Core Threat Detection Module contains licensed content that is available only to registered customers
with a valid maintenance contract.
Core Threat Detection Deployment Guide Core Threat Detection User Guide
Matrices
AI Engine Rules Lists Reports
Matrices 4
Core Threat Detection Module
AD/LDAP In Windows,
3 Compromise: 9 1 Normal 12 No AD/LDAP,Host X
activate Audit
Distributed
Account
Brute Force
Management
for successes in
the Group/Local
Security Policy.
AD/LDAP
9 Recon: Failed 4 1 Normal 6 No AD/LDAP,Host X
Distributed
Account Probe
IDS/IPS
17 Lateral: External 9 1 Normal 1 No IDS/IPS X
Attack then
Account
Creation
Host Security
19 Attainment: Log 9 3 Normal 1 No NextGen Firewall X
Logs/AV/IDS/IPS
Cleared
IDS/Security/
29 Lateral: 9 1 Normal 2 No IDS/Security/AD/ X
AD/LDAP
Privilege LDAP
Escalation after
Attack
IDS/Security/
52 Lateral: Internal 9 4 Normal 6 No IDS/Security/AD/ X
AD/LDAP
Attack then LDAP
Account
Creation
AV/IDS/IPS
72 Compromise: 9 3 Normal 2 No NextGen Firewall X
Malware
Outbreak
Firewall or
79 C2: Malware: 6 7 Normal 3600 No LogRhythm X
Network Flow
Outbound IRC Network Monitor,
Data (internal/
Next Gen Firewall
egress)
(internal/egress)
Web Server
89 Recon: 4 5 Normal 30 No Web Server X
Excessive HTTP
Errors
Firewall or
111 Recon: 4 5 Normal 3600 No LogRhythm X
Network Flow
Metasploit Network Monitor,
Data (internal)
Activity Next Gen Firewall
Observed (internal)
Firewall or
473 Compromise: 6 3 Normal 3600 No LogRhythm X
Network Flow
Inbound RDP/ Network Monitor,
Data
VNC Next Gen Firewall
(perimeter)
(perimeter)
Firewall or
475 C2: Excessive 6 5 Normal 60 No LogRhythm X
Network Flow
Outbound Network Monitor,
Data
Firewall Denies Next Gen Firewall
(perimeter)
(perimeter)
AD/LDAP
510 Lateral: 6 8 Normal 60 No Host (Optional) If you X
Password would like to
Modified by exclude system
Admin accounts from
this alarm,
add an exclude
filter for an
Origin Login or
Account which
matches the
regular
expression ‘. *?/
$'
AD/LDAP
511 Lateral: Admin 6 3 Normal 60 No Host (Optional) If you X
Password would like to
Modified exclude system
accounts from
this alarm,
add an exclude
filter for an
Origin Login or
Account which
matches this
regular
expression: \$$
AD/LDAP
546 Recon: Multiple 6 5 Normal 1 No Host X
Lockouts
IDS/IPS and
711 C2: Attack then 8 5 Normal 1 No LogRhythm X
Firewall or
Outbound Network Monitor,
Network Flow
Connection Next Gen Firewall
Data
Host Security
715 Lateral: Locally 9 5 Normal 2 No Single Sign On X
Logs
Created and Logs
Used
Firewall or LogRhythm
1180 Compromise: 6 6 Normal 3600 No Cannot tune X
Network Flow Network Monitor,
Obsolete SSL/ this but assists
Data Next Gen Firewall
TLS Version with reporting
and insight. It is
recommended
to enforce
web server
policy to not
fallback to
older/
vulnerable
versions. It is
also
recommended
for web
browsers.
Rule ID Rule Risk Rating FPP Runtime Suppression Alarm on Endpoint Network User Threat
Priority Multiple Event Threat Threat Detection
Detection Detection
Rule ID Rule Risk Rating FPP Runtime Suppression Alarm on Endpoint Network User Threat
Priority Multiple Event Threat Threat Detection
Detection Detection
Rule ID Rule Risk Rating FPP Runtime Suppression Alarm on Endpoint Network User Threat
Priority Multiple Event Threat Threat Detection
Detection Detection
X
1014 Account Management Active Directory or Host Logs
Activity LDAP
X X
1015 Top Attackers Any Security Log Anti-Virus, Intrusion
Summary Source Detection System,
Vulnerability Scanner,
LogRhythm Network
Monitor,
Next Generation Firewall
Module Contents
This module adds to an existing LogRhythm deployment, as follows:
• 42 AI Engine Rules (15 Progression Rules)
• 8 Lists
• 2 Reports
Prerequisites
The deployment of this module assumes the following:
• The overall LogRhythm deployment is in a fully-deployed and healthy state.
• LogRhythm version 7.1 or later is installed.
Overview of Steps
This guide is divided into the following sections:
Core Threat Detection Deployment Guide—Upgrade Considerations
Core Threat Detection Deployment Guide—Import and Synchronize the Module
Core Threat Detection Deployment Guide—Configure the Module
The current release (version 4) of the Core Threat Detection Module (CTDM) includes a substantial number of changes
since the last release (version 3). This section should help you understand the implications of updating to the latest
version of CTDM, based on your current deployment.
Definitions
Existing. Refers to the original state of CTDM (v3 or lower) prior to upgrading to the current version (v4).
Upgrade. Refers to importing the KB that includes updates to CTDM.
Step 1 - Use the Advanced Synchronization Settings and Reset the Module
When you synchronize a module, you can deploy some or all the recommended settings. By default, the KB
synchronization will only update the system fields that cannot be changed, such as the name and common event. Other
editable settings, such as include/exclude filters or risk rating will not be updated. In the default synchronization, new
filters will be added, but existing filters will not be reset or updated.
Because of the rule merge, it is possible that custom modifications may conflict with the CTDM v4 changes,
resulting in a rule that will not fire because the filter settings are contradictory. For example, if a rule with
primary criteria of Network Allow or Network Deny has been tuned by adding an exclude filter for the
classification Network Deny, the KB sync could modify the rule’s primary criteria to the classification of
Network Deny. This results in a rule with system primary criteria and custom exclude filter which conflict. The
rule will never fire.
You may choose to synchronize more settings by using the Advanced Synchronization function. Some LogRhythm SIEM
versions have advanced settings that allow you to synchronize values like Risk Rating, FPP, Runtime Priority,
Suppression Period and Alarm on Event automatically, whereas with other LogRhythm versions you may need to
update these values manually.
To use Advanced Synchronization
1. In the Client Console on the Tools menu, click Knowledge, and then click Knowledge Base Manager.
2. Under AI Engine Rule Properties, select the Enable Advanced Synchronization Settings check box.
3. In the Knowledge Base Manager, click Synchronization Settings, and then click the Synchronize Additional
System Properties tab.
This setting synchronizes user editable rule settings for all system AI Engine rules, including rule block time limit
settings, unique value rule block occurrences, and threshold rule block values.
4. Select the Only sync additional properties for disabled rules check box.
This only synchronizes advanced settings when the AI Engine rule has been disabled, preventing unexpected
changes to currently active rules.
5. Click OK and proceed with the KB synchronization.
After the KB synchronization, revert these changes to prevent accidental overwrites of other modules when
synchronizing the KB in the future.
Step 2 – Manually Update the Risk Rating, FPP, Runtime Priority, Suppression Period and Alarm on
Event values
After the rules are synchronized, the Risk Rating, FPP, Runtime Priority, Supression Period and Alarm on Event values
will not be updated to the current values recommended LogRhythm Labs.
To update the values, open each rule and change the Risk Rating, FPP, Runtime Priority, Suppression Period and Alarm
on Event values according to the AIE Rules table. If you have tuned these values for your environment, you can retain
your custom values instead of accepting the value suggested by LogRhythm.
To open the Knowledge Base Manager, the Deployment Manager must be closed.
2. Under Knowledge Base Modules, find the Core Threat Detection module.
If the module is available, you will see Core Threat Detection in the grid. If the module name does not appear,
update the Knowledge Base by doing either of the following:
• Automatic Download. Click Check for Knowledge Base Updates, and then click Synchronize Stored
Knowledge Base.
• Manual Download. For manual download instructions, see Import a Knowledge Base.
3. Locate the Enabled column in the grid. If the box is checked, the module is already enabled and available to
users in the SIEM deployment. If the Enabled box is not checked, enable the module by selecting its Action check
box, right-clicking the module name, clicking Actions, and then clicking Enable Module.
A dialog box appears to enable the selected module(s).
4. Leave the Enable Intelligent Indexing on Module Objects cleared unless you fully understand the effects of this
setting. For more information, see the Intelligent Indexing topic in the SIEM Reference Guide.
Configure Lists
There are user-configurable lists included with the module. Use these lists to narrow the scope of AI Engine Rules and to
filter events. Refer to the Description section of the List Properties to verify what should be added to the list.
1. Open the LogRhythm Console and click List Manager on the main toolbar.
2. Use the Name or List ID column filter to find the list you want.
3. To open the List Properties window, double-click the list.
4. Click on the List Items tab, and then click Add Item.
5. Use the Add Item dialog to add items to the list individually, or click Import to import a text file or clipboard
contents.
6. Click Apply and then click OK.
To identify which lists need to be configured in the environment, see the List matrix.
You must select the AI Engine instance in the View field to see the Restart column.
To view tuning and configuration notes for a rule, right-click the rule, click Properties, and then click the Information
tab.
Your LogRhythm Professional Services Engineer can also provide assistance with tuning AI Engine Rules for your
environment.
Before enabling Alarming, review these events and tune rules as necessary to meet an acceptable level of false
positives. Refer to the Core Threat Detection Module User Guide for information about tuning individual AI Engine Rules.
When finished tuning, enable alarming on the rules to bring events to the alarm layer, providing visibility to the
monitoring team and allowing for notification and SmartResponse.
1. Open the LogRhythm Console and click Deployment Manager.
2. Click the AI Engine tab.
3. Filter in the Rule Group column for Network Threat Detection to find AI Engine rules tied to this module.
The value in the Alarm Status column indicates whether alarm is enabled for a rule.
4. Select the Action check box of each rule you want to configure.
5. Right-click the grid, click Actions, click Batch Enable Alarms, and then click Enable Alarms.
Alarm settings are located on the Settings tab of the Alarm Properties dialog box.
The Core Threat Detection Module is a collection of AI Engine rules designed to detect unusual or malicious activity that
is occurring on an organization’s network. This guide is for LogRhythm administrators who are responsible for the
security of their organization’s infrastructure. Other security suite documentation can be used when upgraded to more
advanced rule sets. LogRhythm publications and Support contact information are available on the LogRhythm Support
Portal, and additional information can be found in the LogRhythm Community.
The Core Threat Detection Module contains licensed content that is available only to registered customers
with a valid maintenance contract.
Prerequisites
This guide assumes the following:
• The Core Threat Detection Module has been imported and the AI Engine rules you want are enabled following
the steps in the Core Threat Detection Module Deployment Guide.
• Appropriate log sources, such as LogRhythm System Monitor Agents, Windows Security Events, Firewalls,
Intrusion Detection Systems, Anti Virus, and others have been configured to work with LogRhythm.
• In order to identify internal and external sources for directional traffic, the network entity structure has been
configured.
• The LogRhythm Lists referenced by rules in this suite have been configured to the organization’s environment.
Rule Description
A successful brute force authentication -- multiple failed authentication attempts from different external hosts to
the same host using the same origin login, followed by an authentication success.
Common Event: AIE: Compromise: Distributed Brute Force
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 1
Actions
This rule fires when the attacker was able to compromise at least one account. In this case, it is vital to quickly
contain the compromise by disconnecting infected hosts, disabling the compromised account, and blocking the
attacker's access -- organizations should have an incident response plan for a compromise. Also, after stopping
the active attack, forensics will need to be conducted to insure that an implant isn't hidden in the network,
information wasn't stolen, or other accounts were compromised.
Use Case
An attacker knows a login ID to a specific host and repeatedly attempts to authenticate using various passwords
from different origin hosts in an attempt to mask the password guessing activity, and eventually successfully
authenticates.
Rule Description
The same external account unsuccessfully attempts to authenticate to multiple hosts within a short period of
time.
Common Event: AIE: Recon: Failed Distributed Account Probe
Classification: Reconnaissance
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 1
Actions
Responses to 'failure' alarms should include hardening the potential victim host and account and blocking the
attacker. It is also useful to determine if the attack is a determined effort to compromise the network or just a
passing probe. Perform follow-up investigations for additional logs generated by the attacker and victim.
Remember that a failure alarm may mean that the attacker was still successful in other attempts.
Use Case
A malicious individual finds a ""sticky note"" with a user name and password. The attacker then attempts to use
these credentials on several different hosts, with no successful authentication observed.
Rule Description
Attack or compromise event from an external source followed by an account creation on the same host.
Common Event: AIE: Lateral: External Attack then Acct Creation
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 1
Actions
The cost and recovery time of a compromise grows exponentially with each stage of the attack cycle, so it is
imperative to stop the attack as early as possible. These rules indicate that the attacker has moved past the initial
stages and is consolidating their beachhead. After the attack is stopped, it is very important to do a full sweep of
the network for other signs of continued infection.
Use Case
A savvy hacker successfully attacked a machine to gain access. Once in the exploited machine the hacker now
created an account to use for future use and exploitation.
Rule Description
A compromise event from an external source followed by the audit log being cleared on the same compromised
host. ETD CTD
Common Event: AIE: Attainment: Log Cleared
Classification: Security : Compromise
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 3
List
Not applicable
Actions
Run investigations for the impacted host and user that performed the activity. Check what process cleared the
audit log and make sure it is legitimate.
Use Case
An attacker compromises a host and clears the audit log to cover their tracks.
security-related event on the same host, such as an account gaining new rights on the target, it should be a major cause
for concern. This is an indicator that the attack was successful, and that the malicious actor has begun moving deeper
into their attack cycle.
Rule Description
Compromised host event followed by a new account created or account modified on the same host.
Common Event: AIE: Lateral: Privilege Escalation after Attack
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 2
False Positive Probability: 1
Actions
The cost and recovery time of a compromise grows exponentially with each stage of the attack cycle, so it is
imperative to stop the attack as early as possible. These rules indicate that the attacker has moved past the initial
stages and is consolidating their beachhead. After the attack is stopped, it is very important to do a full sweep of
the network for other signs of continued infection.
Use Case
An IDS has detected some sort of hacking activity from an external host. Later, the same external host is seen
successfully authenticating with an internal host, indicating a successful network penetration.
Rule Description
Attack or compromise event from an internal host followed by an account creation on the victim host.
Common Event: AIE: Lateral: Internal Attack then Acct Creation
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 4
Actions
Because the attack has already progressed to an advanced stage, it is imperative to stem the damage and stop the
attack as early as possible. These rules indicate that the attacker has moved past the initial stages, is spreading
throughout the network, and likely has already begun to pillage. After the attack is stopped, use the logs from the
alarm to help with a full sweep of the network for other signs of continued infection.
Use Case
A system is successfully attacked, and the attacker then creates a new account on the system in order to maintain
access.
Rule Description
Multiple observed malware detections or failed malware detections within a given period on different impacted
hosts - grouped by Common Event and Threat Name. ETD CTD
Common Event: AIE: Compromise: Malware Outbreak
Classification: Compromise
Suppression Period: 2
Environmental Dependence Factor: 1
False Positive Probability: 3
Actions
Not applicable
Use Case
Not applicable
Actions
Investigate the Origin IP if it’s a known host and service and quarantine or remove from the network if unknown.
Block the Impacted and Origin IP from inbound and outbound on perimeter Firewall. Determine if Origin IP was
compromised and remediate as necessary otherwise add Impacted IP to a Watch List to determine if Attack was
successful.
Use Case
An internal host has been compromised and is now part of a botnet, typically controlled via IRC.
Rule Description
Internal reconnaissance event followed by an account creation on the same target host, indicating a possible
compromise.
Common Event: AIE: Lateral: Internal Recon then Account Creation
Classification: Compromise
Suppression Period: 1
Actions
Since an internal host is already compromised, follow incident response procedures. Investigate the attacking
host to see if it was able to access any additional hosts. Investigate the created account to see what actions it was
able to take.
Use Case
An attacker scans a machine for open ports. The IDS then misses the actual attack, but shortly after the scan is
detected a new account is created on the target machine, indicating some sort of attempt to maintain access.
Rule Description
Excessive HTTP Error Codes seen on the same Impacted Host, originating from the same Origin Host, indicating
some sort of automated scanning activity.
Common Event: AIE: Recon: Excessive HTTP Errors
Classification: Reconnaissance
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 4
Actions
Investigate the Origin IP if it’s a known host, quarantine unknown hosts to a Remediation VLAN, block the Origin IP
from inbound and outbound on perimeter Firewall and determine what the Attacker was looking for to aid in
evaluating if compromise was successful. Determine if Impacted IP Host and Application are known and
quarantine if compromise is found or add to Watch List for further compromise assessment.
Use Case
An attacker has written a script that attempts to access various default phpmyadmin access directories on a given
website. The attacker is running the script against a web server.
Rule Description
Observed traffic on port 4444, the default port for most Metasploit attack vector.
Common Event: AIE: Recon: Metasploit Activity Observed
Classification: Reconnaissance
Suppression Period: 1 Environmental
Dependence Factor: 1
False Positive Probability: 5
Actions
Investigate the Origin IP if it’s a known host and should be added to the Vulnerability Scanner List, quarantine
unknown hosts to a Remediation VLAN, block the Origin IP from inbound and outbound on perimeter Firewall.
Determine if Impacted IP Host and Application are known and quarantine if compromise is found or add to Watch
List for further compromise assessment.
Use Case
An attacker is using Metasploit to launch an attack without changing the default port.
Rule Description
Remote Desktop Protocol (RDP) or VNC connection from an external to internal host.
Common Event: AIE: Compromise: Inbound RDP/VNC
Classification: Suspicious
Suppression Period: 1
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
Valuable in detecting compromised hosts and network/policy abuse.
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
An internal compromised host is attempting communication via blocked protocol.
Rule Description
Privileged user changes the password of another account.
Common Event: AIE: Lateral: Password Modified by Admin
Classification: Suspicious
Suppression Period: 1
Environmental Dependence Factor: 2
False Positive Probability: 8
Actions
Verify the change control procedure has been followed and that this user's password was reset according to
standards and guidelines.
Use Case
A privilege user changes the password of another user.
Rule Description
User changes the password of a different privileged user account.
Common Event: AIE: Lateral: Admin Password Modified
Classification: Suspicious
Suppression Period: 1
Privilege Users
-2091
Actions
Verify the admin was aware of the password change. Also verify change control procedure has been followed and
that this user's password was reset according to standards and guidelines.
Use Case
A user's password has been changed by a privileged user.
Rule Description
An account is locked out 2 or more times per hour.
Common Event: AIE: Recon: Multiple Lockouts
Classification: Suspicious
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 5
Actions
Accounts under attack should be temporarily disabled while under investigation. Attack sources should be
blocked via firewall or other security devices.
Use Case
In large companies it sometimes can be daunting and tedious to sift through the ""noise"" of potential operational
events of interest. This alarm alerts when accounts are locked out 2 or more times in an hour instead of every time
an account is locked out.
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
An attacker is looking for sensitive financial information. The attacker successfully compromises a host and is able
to copy the information to the attacker's host.
Rule Description
Login by an administrator followed by disabling of an audit process.
Common Event: AIE: Corruption: Audit Disabled by Admin
Classification: Compromise
Suppression Period: 8
Environmental Dependence Factor: 3
False Positive Probability: 1
Privilege Users
-2091
Actions
If audits are being disabled, it is highly likely that malicious activity is taking place. Immediately launch
LogRhythm investigations on the Log Source where this is occurring.
Use Case
A disgruntled administrator plans on malicious activity and disables auditing beforehand to ensure the activity
isn't logged.
Configuration
An include filter where Origin Login = list of privileged user ids must be entered into RB1.
Rule Description
An account is created on a host and then used shortly thereafter on the same host. ETD CTD
Common Event: AIE: Lateral: Locally Created and Used
Classification: Compromise
Suppression Period: 1
Actions
Not applicable
Use Case
Not applicable
Rule Description
Attack or compromise event from an internal host followed by data leaving the victim host. ETD CTD
Common Event: AIE: Exfil: Lateral Movement then Exfil
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 5
Actions
Not applicable
Use Case
Not applicable
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
Detection of local hosts tunneling traffic over port 53. This would typically be a violation of network policy and a
security risk.
Rule Description
Single host is seen sending a lot of data, within the same 30 minute-long session, out of the network.
Common Event: AIE: Exfiltration: Large Outbound Transfer
Classification: Suspicious
Suppression Period: 1
Environmental Dependence Factor: 2
False Positive Probability: 2
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
A disgruntled employee is exfiltrating Intellectual Property out of the network.
Rule Description
For this rule we look for an excessive number (400) of network denied events from a host within 5 minutes.
Common Event: AIE: Recon: Excessive Inbound Firewall Denies
Classification: Reconnaissance
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 9
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
An external compromised host is attempting communication via a blocked protocol.
Rule Description
The same security event is detected on the same host multiple times within a short window.
Common Event: AIE: Compromise: Repeated Attacks Against Host
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 5
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
A Snort IDS deployment is firing repeatedly because an infected host is attempting to spread on the network.
Rule Description
Internal hosts using an external DNS server.
Common Event: AIE: C2: External DNS Server Used
Classification: Suspicious
Suppression Period: 1
Environmental Dependence Factor: 1
False Positive Probability: 4
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
A network host has been infected with malware and is using a compromised external DNS server.
Rule Description
A malware removal event from a host followed immediately (within 1 hour) by another malware event. This
indicates that the malware was not completely removed. ETD CTD
Common Event: AIE: Compromise: Malware Not Cleaned
Classification: Malware
Suppression Period: 1
Actions
Not applicable
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as Reconnaissance and Planning is followed by Initial Compromise with the same user or host.
Common Event: AIE: Progression: to Initial Compromise
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as Reconnaissance and Planning or Initial Compromise is followed by Command and Control
with the same user or host.
Common Event: AIE: Progression: to Command and Control
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as an earlier stage is followed by Lateral Movement with the same user or host.
Common Event: AIE: Progression: to Lateral Movement
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as any earlier stage is followed by Exfiltration, Corruption, Disruption with the same user or
host.
Common Event: AIE: Progression: to Target Attainment
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as Reconnaissance and Planning is followed by Initial Compromise with the same user or host.
Common Event: AIE: Progression: to Exfil, Corruption, Disruption
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as any earlier stage is followed by Target Attainment with the same user or host.
Common Event: AIE: Progression: to Initial Compromise
Classification: Attack
Suppression Period: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as any earlier stage is followed by Exfiltration, Corruption, Disruption with the same user or
host.
Common Event: AIE: Progression: to Command and Control
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as Reconnaissance and Planning is followed by Initial Compromise with the same user or host.
Common Event: AIE: Progression: to Lateral Movement
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as Reconnaissance and Planning or Initial Compromise is followed by Command and Control
with the same user or host.
Common Event: AIE: Progression: to Target Attainment
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as an earlier stage is followed by Lateral Movement with the same user or host.
Common Event: AIE: Progression: to Exfiltration, Corruption, Disruption
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as Reconnaissance and Planning or Initial Compromise is followed by Command and Control
with the same user or host.
Common Event: AIE: Progression: to Initial Compromise
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as an earlier stage is followed by Lateral Movement with the same user or host.
Common Event: AIE: Progression: to Command and Control
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as any earlier stage is followed by Target Attainment with the same user or host.
Common Event: AIE: Progression: to Lateral Movement
Classification: Attack
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as any earlier stage is followed by Target Attainment with the same user or host.
Common Event: AIE: Progression: to Target Attainment
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
Progression rules monitor for activity moving through the attack lifecycle. This alarm will fire when observed
activity categorized as any earlier stage is followed by Exfiltration, Corruption, Disruption with the same user or
host.
Common Event: AIE: Progression: to Exfil, Corruption, Disruption
Classification: Compromise
Suppression Period: 1
Environmental Dependence Factor: 3
False Positive Probability: 1
Actions
This rule looks for AIE Feedback events which move through the Attack Lifecycle stages. There will always be a
Host (Impacted), Host (Origin), or User (Origin) in common. Drilling down on this alarm will return the AIE events
which triggered it. Drill down on those events to return the underlying log data. Run an investigation for the User
or Host specified to look for related activity.
Use Case
Not applicable
Rule Description
SSL/TLS Vulnerable Versions Detected.
Common Event: AIE: Compromise: Obsolete SSL/TLS Version
Classification: Suspicious
Suppression Period: 1
Environmental Dependence Factor: 2
False Positive Probability: 3
Actions
Investigate the Origin IP and Origin Application if it’s known, quarantine unknown hosts to a Remediation VLAN,
block the Origin IP from inbound and outbound on perimeter Firewall. Determine if Impacted IP Host, Application
and reputation are known, block the Impacted IP from inbound and outbound on perimeter Firewall if unknown
or add to Watch List for further assessment.
Use Case
Older versions of SSL/TLS protocols pose a risk for Man In The Middled (MITM), where encrypted data can be read by
unintended recipients. Many web servers and browsers are configured to "Fall Back" to an older and most likely
vulnerable version of SSL/TLS if unable to negotiate at the recommended version at the time.