Types
|
Categories
|
Devices with High Event Rates
|
Anomaly
|
Excessive Firewall Denies from Single Source
|
Anomaly
|
Single IP with Multiple MAC addresses
|
Anomaly
|
First−Time User Access to Critical Asset
|
Anomaly
|
Remote Access from Foreign CountryƒRegion
|
Anomaly
|
Anomaly: Excessive Firewall Accepts From Multiple Source to a Single Destination
|
Anomaly
|
Excessive Database Connections
|
Anomaly
|
First−Time User Access to Critical Asset
|
Authentication
|
Login Failure to Disabled Account
|
Authentication
|
Login Failure to Expired Account
|
Authentication
|
Multiple Login Failures from the Same Source (Windows)
|
Authentication
|
Possible Shared Accounts
|
Authentication
|
Repeat Non−Windows Login Failures
|
Authentication
|
Login Failures Followed By Success from the same Source IP
|
Authentication
|
Login Failures Followed By Success to the same Source IP
|
Authentication
|
Login Failures Followed By Success to the same Username
|
Authentication
|
Multiple Login Failures for Single Username
|
Authentication
|
Multiple Login Failures from the Same Source
|
Authentication
|
Multiple Login Failures to the Same Destination
|
Authentication
|
Repeat Windows Login Failures
|
Authentication
|
Potential Botnet Events Become Offenses
|
Botnet
|
DDoS Attack Detected
|
D\DoS
|
DDoS Events with High Magnitude Become Offenses
|
D\DoS
|
DoS Events with High Magnitude Become Offenses
|
D\DoS
|
Network DoS Attack Detected
|
D\DoS
|
Service DoS Attack Detected
|
D\DoS
|
Login Failure to Disabled Account
|
Horizontal Movement
|
Login Failure to Expired Account
|
Horizontal Movement
|
Chained Exploit Followed by Suspicious Events
|
Intrusion Detection
|
Chained Exploit Followed by Suspicious Events on the Third Host
|
Intrusion Detection
|
Destination Vulnerable to Detected Exploit
|
Intrusion Detection
|
Exploit: Destination Vulnerable to Detected Exploited on a Different Port
|
Intrusion Detection
|
Exploits Events with High Magnitude Become Offenses
|
Intrusion Detection
|
Login Failures Followed By Success from the same Source IP
|
Intrusion Detection
|
Login Failures Followed By Success from the same Destination IP
|
Intrusion Detection
|
Login Failures Followed By Success to the same Username
|
Intrusion Detection
|
Source Vulnerable to any Exploit
|
Intrusion Detection
|
Source Vulnerable to this Exploit
|
Intrusion Detection
|
100% Accurate Events
|
Intrusion Detection
|
All Exploits Become Offenses
|
Intrusion Detection
|
Attack followed by Attack Response
|
Intrusion Detection
|
Database Failures Followed by User Changes
|
Intrusion Detection
|
Database Multiple Database Failures Followed by Success
|
Intrusion Detection
|
Destination Vulnerable to Different Exploit than Attempted on Targeted Port
|
Intrusion Detection
|
Exploit Followed by Suspicious Host Activity
|
Intrusion Detection
|
ExploitƒMalware Events Across Multiple Destinations
|
Intrusion Detection
|
Exploits: Exploits Followed by Firewall Accepts
|
Intrusion Detection
|
Multiple Exploit Types Againts Single Destination
|
Intrusion Detection
|
Multiple Vector Attack Source
|
Intrusion Detection
|
BadRabbit Detected in Real Time
|
Malware
|
Local Host Sending Malware
|
Malware
|
Malware or Virus Clean Failed
|
Malware
|
TIME−Forticlient
|
Malware
|
Treat Backdoor Trojan and Virus Events as Offenses
|
Malware
|
Treat Key Loggers as Offenses
|
Malware
|
Treat Non−Spyware Malware as Offenses
|
Malware
|
Treat Spyware and Virus as Offenses
|
Malware
|
Ransomware Behaviour from Endpoint Security Logs
|
Ransomware
|
Ransomware Behaviour from Microsoft Windows Security Event Logs
|
Ransomware
|
UBA: Ransomware Behavior from Endpoint Security Logs
|
Ransomware
|
UBA: Ransomware Behavior from Microsoft Windows Security Logs
|
Ransomware
|
Database Remote Login Failure
|
Recon
|
Excessive Database Connections
|
Recon
|
Excessive Failed Logins to Compliance IS
|
Recon
|
Excessive Firewall Accepts Across Multiple Hosts
|
Recon
|
Excessive Firewall Denies from Local Host
|
Recon
|
Excessive Firewall Denies from Remote Host
|
Recon
|
Multiple Login Failures from the Same Source
|
Recon
|
Multiple Login Failures from the Same Source (Windows)
|
Recon
|
Multiple Login Failures to the Same Destination
|
Recon
|
Repeat Non−Windows Login Failures
|
Recon
|
Repeat Windows Login Failures.
|
Recon
|
Anomaly: Excessive Firewall Accepts From Multiple Sources to a Single Destination
|
Post Intrusion Activity
|
Database Attempted Configuration Modification by a remote host
|
Post Intrusion Activity
|
Database Concurrent Logins from Multiple Locations
|
Post Intrusion Activity
|
Database Groups Changed from Remote Hsot
|
Post Intrusion Activity
|
Database User Rights Changed from Remote Host
|
Post Intrusion Activity
|
Local Mass Mailing Host Detected
|
Post Intrusion Activity
|
Possible Local Worm Detected
|
Post Intrusion Activity
|
Worm Detected (Events)
|
Post Intrusion Activity
|
Device Stopped Sending Events
|
System
|
Load Basic Building Blocks
|
System
|
System Notification
|
System
|
Failed Communication to a Malicious Website
|
Threats
|
Multiple Threats Detected on Same Host
|
Threats
|
Possible Shared Accpunts
|
Threats
|
Potential Botnet Events Become Offenses
|
Threats
|
Potential Honeypot Access
|
Threats
|
Same Threat Detected on Multiple Hosts
|
Threats
|
Same Threat Detected on Multiple Servers
|
Threats
|
Same Threat Detected on Same Host
|
Threats
|
Same Threat Detected on Same Network Different Hosts
|
Threats
|
Successful Communication to a Malicious Website
|
Threats
|
X−Force Premium: Internal Host Communicating with Botnet Command and Control URL
|
Threats
|
X−Force Premium: Internal Host Communicating with Malware URL
|
Threats
|
UBA: Account or Group or Privileges Added
|
User Behavioral Analytics
|
UBA: Account or Group or Privileges Modified
|
User Behavioral Analytics
|
UBA: Anomalous Account Created From New Location
|
User Behavioral Analytics
|
UBA: Anomalous Cloud Account Created From New Location
|
User Behavioral Analytics
|
UBA: Browsed to BusinessƒService Website
|
User Behavioral Analytics
|
UBA: Browsed to Communication Website
|
User Behavioral Analytics
|
UBA: Browsed to Entertainment Website
|
User Behavioral Analytics
|
UBA: Browsed to Gambling Website
|
User Behavioral Analytics
|
UBA: Browsed to Information Technology Website
|
User Behavioral Analytics
|
UBA: Browsed to Job Search Website
|
User Behavioral Analytics
|
UBA: Browsed to LifeStyle Website
|
User Behavioral Analytics
|
UBA: Browsed to Malicious Website
|
User Behavioral Analytics
|
UBA: Browsed to Mixed ContentƒPotentially Adult Website
|
User Behavioral Analytics
|
UBA: Browsed to Phishing Website
|
User Behavioral Analytics
|
UBA: Browsed to Pornography Website
|
User Behavioral Analytics
|
UBA: Browsed to ScamƒQuestionableƒIllegal Website
|
User Behavioral Analytics
|
UBA: Browsed to Uncategorized Website
|
User Behavioral Analytics
|
UBA: Bruteforce Authentication Attempts
|
User Behavioral Analytics
|
UBA: Common Exploit Tool Detected
|
User Behavioral Analytics
|
UBA: Common Exploit Tool Detected (Asset)
|
User Behavioral Analytics
|
UBA: Create Offense
|
User Behavioral Analytics
|
UBA: Critical Systems Users Seen Update
|
User Behavioral Analytics
|
UBA: DƒDoS Attack Detected
|
User Behavioral Analytics
|
UBA: Detect Insecure or Non−Standard Protocol
|
User Behavioral Analytics
|
UBA: Detect IOC's For Locky
|
User Behavioral Analytics
|
UBA: Detect IOC's for WannaCry
|
User Behavioral Analytics
|
UBA: Detect Persistent SSH Session
|
User Behavioral Analytics
|
UBA: Dormant Account Found (privileged)
|
User Behavioral Analytics
|
UBA: Dormant Account Used
|
User Behavioral Analytics
|
UBA: Executive Only Asset Accessed by Non−Executive User
|
User Behavioral Analytics
|
UBA: Expired Account Used
|
User Behavioral Analytics
|
UBA: First Privileged Excalation
|
User Behavioral Analytics
|
UBA: High Risk User Access to Critical Asset
|
User Behavioral Analytics
|
UBA: Hioneytoken Activity
|
User Behavioral Analytics
|
UBA: Internet Settings Modified
|
User Behavioral Analytics
|
UBA: Kerberos Accpount Mapping
|
User Behavioral Analytics
|
UBA: Large Outbound Transfer by Hugh Risk User
|
User Behavioral Analytics
|
UBA: Malicious Process Detected
|
User Behavioral Analytics
|
UBA: Malware Activity − Registry Modified in Bulk
|
User Behavioral Analytics
|
UBA: Multiple Kerberos Authentication Failures from Same User
|
User Behavioral Analytics
|
UBA: Multiple VPN Accounts Failed Login from Single IP.
|
User Behavioral Analytics
|
UBA: Mutliple VPN Accpounts ogged in From Single IP
|
User Behavioral Analytics
|
UBA: Netcast Process Detection (Linux)
|
User Behavioral Analytics
|
UBA: Netcase Process Detection (Windows)
|
User Behavioral Analytics
|
UBA: Network Share Accessed
|
User Behavioral Analytics
|
UBA: Network Traffic: Capture, Monitoring and Analysis Program Usage
|
User Behavioral Analytics
|
UBA: New Account Use Detected
|
User Behavioral Analytics
|
UBA: Non−Admin Access to Domain Controller
|
User Behavioral Analytics
|
UBA: Pash the Hash
|
User Behavioral Analytics
|
UBA: Populate Authorized Applications
|
User Behavioral Analytics
|
UBA: Populate Multiple VPN Accounts Failed Login from Single IP
|
User Behavioral Analytics
|
UBA: Populate Multiple VPN Accounts Logged in From Single IP
|
User Behavioral Analytics
|
UBA: Populate Process Filenames
|
User Behavioral Analytics
|
UBA: Possible TGT Forgery
|
User Behavioral Analytics
|
UBA: Potential Access to Blacklist Domain
|
User Behavioral Analytics
|
UBA: Potential Access to DGA Domain
|
User Behavioral Analytics
|
UBA: Potential Access to Squatting Domain
|
User Behavioral Analytics
|
UBA: Potential Access to Tunnelling Domain
|
User Behavioral Analytics
|
UBA: Process Creating Suspicious Remote Threads Detected (Asset)
|
User Behavioral Analytics
|
UBA: Process Executed Outside Gold Disk Whitelist (Linux)
|
User Behavioral Analytics
|
UBA: Process Executed Outside Gold Disk Whitelist (Windows)
|
User Behavioral Analytics
|
UBA: Ransomware Behaviour Detected
|
User Behavioral Analytics
|
UBA: Recent User Activity Update(privileged)
|
User Behavioral Analytics
|
UBA: Repeat Unauthorized Access
|
User Behavioral Analytics
|
UBA: Restricted Program Usage
|
User Behavioral Analytics
|
UBA: Shellbags Modified by Ransomware
|
User Behavioral Analytics
|
UBA: Subject_CN and Username Map Update
|
User Behavioral Analytics
|
UBA: Subject_CN and Username Mapping
|
User Behavioral Analytics
|
UBA: Suspicious Activities on Compromised Hosts
|
User Behavioral Analytics
|
UBA: Suspicious Activities on Compromised Hosts (Asset)
|
User Behavioral Analytics
|
UBA: Suspicious Administrative Activities Detected
|
User Behavioral Analytics
|
UBA: Suspicious Command Prompt Activity
|
User Behavioral Analytics
|
UBA: Suspicious Entries in System Registry (Asset)
|
User Behavioral Analytics
|
UBA: Suspicious Image Load Detected (Asset)
|
User Behavioral Analytics
|
UBA: Suspicious Pipe Activities (Asset)
|
User Behavioral Analytics
|
UBA: Suspicious PowerShell Activity
|
User Behavioral Analytics
|
UBA: Suspicipus Privileged Activity (First Observed Privilege Use)
|
User Behavioral Analytics
|
UBA: Suspicious Privileged Activity (Rarely Used Privileged)
|
User Behavioral Analytics
|
UBA: Suspicipus Scheduled Task Activities
|
User Behavioral Analytics
|
UBA: Suspicious Service Activities
|
User Behavioral Analytics
|
UBA: Suspicious Service Activities (Asset)
|
User Behavioral Analytics
|
UBA: TGT Ticket Used by Multiple Hosts
|
User Behavioral Analytics
|
UBA: Unauthorized Access
|
User Behavioral Analytics
|
UBA: UNIXƒLINUX System Accessed With Service or Machine Account
|
User Behavioral Analytics
|
UBA: Unusual Scanning of Database Servers Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of DHCP Servers Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of DNS Servers Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of FTP Servers Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of Game Servers Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of Generic ICMP Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of Generic TCP Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of Generic UDP Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of IRC Servers Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of LDAP Servers Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of Mail Servers Detected
|
User Behavioral Analytics
|
UBA: Unusual Scanning of Messaging Servers Detected
|
User Behavioral Analytics
|