Alert Types Based on Timestamp
Release: 5.4
The following built-in alert types are based on timestamp:
-
Abnormal Parent / Child Process, Subtype: Machine Learning Anomaly Detection
-
Account Creation Anomaly
-
Application Usage Anomaly
-
Bad Destination Reputation Anomaly
-
Bad Source Reputation Anomaly
-
Carbon Black:XDR Anomaly
-
Command & Control Reputation Anomaly
-
Command Anomaly
-
Cryptojacking
-
CylanceOPTICS:XDR Anomaly
-
Data Ingestion Volume Anomaly
-
DGA
-
DHCP Server Anomaly
-
DNS Tunneling Anomaly
-
Encoded PowerShell
-
Encrypted C&C
-
Exploited C&C Connection
-
External Brute-Forced Successful User Login
-
External Exploited Vulnerability
-
External Firewall Denial Anomaly
-
External Firewall Policy Anomaly
-
External Handshake Failure
-
External IDS Signature Spike
-
External IP / Port Scan Anomaly, Subtype: Connection Spike Anomaly (Firewall / Windows Traffic)
-
External Non-Standard Port Anomaly
-
External Other Malware
-
External Password Spraying
-
External PII Leaked
-
External Plain Text Passwords Detected
-
External PUA
-
External Ransomware
-
External RDP BlueKeep
-
External RDP Brute Force Attack
-
External Scanner Behavior Anomaly
-
External SMB Read Anomaly
-
External SMB Username Enumeration
-
External SMB Write Anomaly
-
External Spyware
-
External SQL Anomaly
-
External SQL Shell Command
-
External Suspected Malicious User Agent
-
External SYN Flood Attacker
-
External SYN Flood Victim
-
External Trojan
-
External User Application Usage Anomaly
-
External User Data Volume Anomaly
-
File Action Anomaly
-
File Creation Anomaly
-
Hydra Password Guessing Hack Tool
-
Internal Brute-Forced Successful User Login
-
Internal Exploited Vulnerability
-
Internal Firewall Denial Anomaly
-
Internal Firewall Policy Anomaly
-
Internal IDS Signature Spike
-
Internal IP / Port Scan Anomaly, Subtype: Connection Spike Anomaly (Firewall / Windows Traffic)
-
Internal Non-Standard Port Anomaly
-
Internal Other Malware
-
Internal Password Spraying
-
Internal PII Leaked
-
Internal PUA
-
Internal Ransomware
-
Internal RDP BlueKeep
-
Internal RDP Brute Force Attack
-
Internal RDP Suspicious Outbound
-
Internal Scanner Behavior Anomaly
-
Internal SMB Read Anomaly
-
Internal SMB Username Enumeration
-
Internal SMB Write Anomaly
-
Internal Spyware
-
Internal SQL Anomaly
-
Internal SQL Dumpfile Execution
-
Internal Suspected Malicious User Agent
-
Internal SYN Flood Attacker
-
Internal SYN Flood Victim
-
Internal Trojan
-
Internal User Application Usage Anomaly
-
Internal User Data Volume Anomaly
-
Long App Session Anomaly
-
Mimikatz DCSync
-
Outbound Destination Country Anomaly
-
Outbytes Anomaly
-
Password Cracking with Hashcat
-
Password Resets Anomaly
-
Password Spraying Attempts Using Dsacls
-
Phishing URL
-
Possible Phishing Site Visit from Email
-
Private to Private Exploit Anomaly
-
Private to Private IPS Signature Spike
-
Private to Public Exploit Anomaly
-
Private to Public IPS Signature Spike
-
Process Anomaly
-
Public to Private Exploit Anomaly
-
Public to Private IPS Signature Spike
-
Public to Public Exploit Anomaly
-
Public to Public IPS Signature Spike
-
RDP Outbytes Anomaly
-
Scanner Reputation Anomaly
-
Sensor Status Anomaly
-
Unapproved Asset Activity
-
Uncommon Application Anomaly
-
Uncommon Process Anomaly
-
User Asset Access Anomaly
-
User Process Usage Anomaly
-
WAF Internal Attacker Anomaly
-
WAF Rule Violation Anomaly