Rules: High Severity Intrusion Signature
This rule looks for an intrusion product detecting a high severity intrusion signature sourcing from an internal IP.
Detail | Value |
---|---|
Type | Templated Match |
Category | Discovery |
Apply Risk to Entities | srcDevice_hostname, srcDevice_ip, user_username |
Signal Name | {{metadata_vendor}} {{metadata_product}} High Severity Intrusion Signature |
Summary Expression | High Severity Intrusion Signature detected: {{threat_name}} from IP: {{srcDevice_ip}} |
Score/Severity | Static: 3 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0007, _mitreAttackTechnique:T1046 |
- Amazon AWS - Network Firewall
- Cisco Systems - ASA
- Cisco Systems - Firepower
- Cisco Systems - Meraki
- Fortinet - Fortigate
- OISF - Suricata IDS
- Palo Alto Networks - Next Generation Firewall
Origin | Field |
---|---|
Normalized Schema | listMatches |
Normalized Schema | metadata_product |
Normalized Schema | metadata_vendor |
Normalized Schema | normalizedSeverity |
Normalized Schema | srcDevice_hostname |
Normalized Schema | srcDevice_ip |
Normalized Schema | srcDevice_ip_isInternal |
Normalized Schema | threat_ruleType |
Normalized Schema | user_username |