Alert Types by XDR Event Name
The following information lists alert types alphabetically by their XDR event name. Details for each alert type can be viewed by clicking the More details link.
For alert types listed alphabetically by their display name, see Alert Types by Name.
| XDR Event Name | Display Name | Alert Type, Subtype Detection Time | 
|---|---|---|
| account_created_deleted_in_short_timeframe | Account Created and Deleted in Short Timeframe More details   Account Created and Deleted in Short Timeframe  | write_time | 
| account_creation_anomaly | Account Creation Anomaly More details   Account Creation Anomaly | timestamp | 
| ade_outbytes_anomaly | Data Ingestion Volume Anomaly More details   Data Ingestion Volume AnomalyA sensor is sending an anomalously high or low volume of data, compared to its typical volume. Check the sensor. A low volume could indicate a sensor failure or other problems. For a high volume, determine the cause of the increase. XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe data ingestion volume of every data sensor with sensor id ( 
 A sample Interflow includes the sensor ID ( | timestamp | 
| ade_outbytes_anomaly_flip | Sensor Status Anomaly More details   Sensor Status AnomalyThe sensor has changed its status from "connected" to "disconnected". For Windows Agent sensors, this alert type  logs the status of each sensor every 5 minutes. The status includes whether or not the sensor is connected and whether or not the sensor is sending data. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each sensor, its connection status is checked periodically, if the status changes from “connected“ to “disconnected“, the anomaly is triggered. A sample Interflow includes the sensor ID ( Alert Subtype: Sensor Status Flipped The Sensor Status Flipped alert subtype is the same as the Sensor Status Anomaly alert type above, with the following differences: 
 Alert Subtype: Disconnected but still sending data The Disconnected but still sending data alert subtype is the same as the Sensor Status Anomaly alert type above, with the following differences: 
 Alert Subtype: Disconnected and stopped sending data The Disconnected and stopped sending data alert subtype is the same as the Sensor Status Anomaly alert type above, with the following differences: 
 Alert Subtype: Disconnected and inactive The Disconnected and inactive alert subtype is the same as the Sensor Status Anomaly alert type above, with the following differences: 
 | timestamp | 
| anomalous_file_action | File Action Anomaly More details   File Action AnomalyActions, such as move, copy, delete, or change attribute, were taken on a file or files an anomalous number of times. Investigate the actions and the user to see if this is expected. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of file actions for each user ( | timestamp | 
| asset_violation | Unapproved Asset Activity More details   Unapproved Asset ActivityActivity of an asset that was marked as unapproved in one of the Asset Analytics tabs has been observed. Unapproved assets generate one alert per day until their approval status is changed with either the Approve or Ignore button in the Asset Analytics tabs. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an analyst marks an asset as unapproved in the Asset Activity tabs, a daily alert is triggered until the asset is either manually approved or ignored. | timestamp | 
| aws_ami_public | AWS AMI Made Public More details   AWS AMI Made PublicAn AWS AMI was made public. Check with the user to make sure this was intentional. XDR Kill Chain
 XDR Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each AWS account ( | write_time | 
| aws_malicious_activity | Potentially Malicious AWS Activity More details   Potentially Malicious AWS ActivityThe Potentially Malicious AWS Activity rules are used to identify suspicious activity within AWS logs. Any one or more of these will trigger the Potentially Malicious AWS Activity alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Potentially Malicious AWS Activity Alert Type | write_time | 
| aws_s3_ransomware | AWS S3 Ransomware More details   AWS S3 RansomwarePossible AWS S3 ransomware was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity90 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each AWS account user name ( | write_time | 
| aws_stoplogging | AWS Logging Stopped More details   AWS Logging StoppedAWS CloudTrail logging was stopped. Check with the user to make sure this was intentional. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each AWS account ( | write_time | 
| aws_suspicious_bucket_enumeration | Suspicious AWS Bucket Enumeration More details   Suspicious AWS Bucket EnumerationThe Suspicious AWS Bucket Enumeration rules are used to identify suspicious activity related to AWS Bucket enumeration. Any one or more of these will trigger the Suspicious AWS Bucket Enumeration alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS Bucket Enumeration Alert Type | write_time | 
| aws_suspicious_cloudtrail_logs_modification | Suspicious Modification of AWS CloudTrail Logs More details   Suspicious Modification of AWS CloudTrail LogsThe Suspicious Modification of AWS CloudTrail Logs rules are used to identify suspicious activity within AWS CloudTrail logs. Any one or more of these will trigger the Suspicious Modification of AWS CloudTrail Logs alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Modification of AWS CloudTrail Logs Alert Type | write_time | 
| aws_suspicious_ebs_activity | Suspicious AWS EBS Activity More details   Suspicious AWS EBS ActivityThe Suspicious AWS EBS Activity rules are used to identify suspicious AWS Elastic Block Store (EBS) activity. Any one or more of these will trigger the Suspicious AWS EBS Activity alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS EBS Activity Alert Type | write_time | 
| aws_suspicious_ec2_activity | Suspicious AWS EC2 Activity More details   Suspicious AWS EC2 ActivityThe Suspicious AWS EC2 Activity rules are used to identify suspicious activity within AWS EC2 logs. Any one or more of these will trigger the Suspicious AWS EC2 Activity alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS EC2 Activity Alert Type | write_time | 
| aws_suspicious_elb_activity | Suspicious AWS ELB Activity More details   Suspicious AWS ELB ActivityThe Suspicious AWS ELB Activity rules are used to identify suspicious activity with AWS ELB. Any one or more of these will trigger the Suspicious AWS ELB Activity alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS ELB Activity Alert Type | write_time | 
| aws_suspicious_iam_activity | Suspicious AWS IAM Activity More details   Suspicious AWS IAM ActivityThe Suspicious AWS IAM Activity rules are used to identify suspicious activity within AWS IAM logs. Any one or more of these will trigger the Suspicious AWS IAM Activity alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS IAM Activity Alert Type | write_time | 
| aws_suspicious_modification_of_route_table | Suspicious Modification of AWS Route Table More details   Suspicious Modification of AWS Route TableThe Suspicious Modification of AWS Route Table rules are used to identify suspicious activity related to modification of AWS route table. Any one or more of these will trigger the Suspicious Modification of AWS Route Table alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Modification of AWS Route Table Alert Type | write_time | 
| aws_suspicious_modification_of_s3_bucket | Suspicious Modification of S3 Bucket More details   Suspicious Modification of S3 BucketThe Suspicious Modification of S3 Bucket rules are used to identify suspicious activity within S3 Bucket logs. Any one or more of these will trigger the Suspicious Modification of S3 Bucket alert type. XDR Kill Chain
 Event NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Modification of S3 Bucket Alert Type | write_time | 
| aws_suspicious_rds_event | Suspicious AWS RDS Event More details   Suspicious AWS RDS EventThe Suspicious AWS RDS Event rules are used to identify suspicious activity related to AWS RDS events. Any one or more of these will trigger the Suspicious AWS RDS Event alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert Types | write_time | 
| aws_suspicious_root_account_activity | Suspicious AWS Root Account Activity More details   Suspicious AWS Root Account ActivityThe Suspicious AWS Root Account Activity rules are used to identify suspicious activity with AWS Root Account. Any one or more of these will trigger the Suspicious AWS Root Account Activity alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS Root Account Activity Alert Type | write_time | 
| aws_suspicious_route53_activity | Suspicious AWS Route 53 Activity More details   Suspicious AWS Route 53 ActivityThe Suspicious AWS Route 53 Activity rules are used to identify suspicious activity within AWS Route 53 logs. Any one or more of these will trigger the Suspicious AWS Route 53 Activity alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS Route 53 Activity Alert Type | write_time | 
| aws_suspicious_ssl_certificate_activity | Suspicious AWS SSL Certificate Activity More details   Suspicious AWS SSL Certificate ActivityThe Suspicious AWS SSL Certificate Activity rules are used to identify suspicious activity with AWS SSL certificates. Any one or more of these will trigger the Suspicious AWS SSL Certificate alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS SSL Certificate Activity Alert Type | write_time | 
| aws_suspicious_vpc_flow_logs_modification | Suspicious AWS VPC Flow Logs Modification More details   Suspicious AWS VPC Flow Logs ModificationThe Suspicious AWS VPC Flow Logs Modification rules are used to identify suspicious modification of AWS VPC Flow logs. Any one or more of these will trigger the Suspicious AWS VPC Flow Logs Modification alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS VPC Flow Logs Modification Alert Type | write_time | 
| aws_suspicious_vpc_mirror_session | Suspicious AWS VPC Mirror Session More details   Suspicious AWS VPC Mirror SessionThe Suspicious AWS VPC Mirror Session rules are used to identify suspicious AWS VPC mirror session activity. Any one or more of these will trigger the Suspicious AWS VPC Mirror Session alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious AWS VPC Mirror Session Alert Type | write_time | 
| azure_ad_add_app_multitenant | Microsoft Entra Apps Modified to Allow Multi-Tenant Access More details   Microsoft Entra Apps Modified to Allow Multi-Tenant AccessMicrosoft Entra ID (formerly Azure Active Directory) observed an application being modified to allow multi-tenant access. Check with the organization to be sure this was expected. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf Microsoft Entra ID detects any user ( | write_time | 
| azure_ad_change_domain | Microsoft Entra Custom Domains Changed More details   Microsoft Entra Custom Domains ChangedMicrosoft Entra ID (formerly Azure Active Directory) observed a custom domain being changed. Check with the organization to be sure this was expected. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf Microsoft Entra ID detects any user ( | write_time | 
| azure_application_configuration_changes | Microsoft Entra Application Configuration Changes More details   Microsoft Entra Application Configuration Changes | write_time | 
| azure_application_gateway_changed | Azure Application Gateway Changed More details   Azure Application Gateway Changed | write_time | 
| azure_application_permission_changes | Microsoft Entra Application Permission Changes More details   Microsoft Entra Application Permission Changes | write_time | 
| azure_bitlocker_key_retrieval | Microsoft Entra BitLocker Key Retrieval More details   Microsoft Entra Bitlocker Key Retrieval | write_time | 
| azure_changes_to_device_registration_policy | Microsoft Entra Changes to Device Registration Policy More details   Microsoft Entra Changes to Device Registration Policy | write_time | 
| azure_changes_to_privileged_account | Microsoft Entra Changes to Privileged Account More details   Microsoft Entra Changes to Privileged Account | write_time | 
| azure_changes_to_privileged_role_assignment | Microsoft Entra Changes to Privileged Role Assignment More details   Microsoft Entra Changes to Privileged Role Assignment | write_time | 
| azure_discovery_using_azurehound | Microsoft Entra ID Discovery Using AzureHound More details   Microsoft Entra ID Discovery Using AzureHound | write_time | 
| azure_dns_zone_change | Azure DNS Zone Changed More details   Azure DNS Zone Changed | write_time | 
| azure_federation_modified | Microsoft Entra Federation Modified More details   Microsoft Entra Federation Modified | write_time | 
| azure_guest_user_invited_by_non_approved_inviters | Microsoft Entra Guest User Invited by Non-Approved Inviters More details   Microsoft Entra Guest User Invited by Non-Approved Inviters | write_time | 
| azure_mfa_disabled | Microsoft Entra ID MFA Disabled More details   Microsoft Entra ID MFA Disabled | write_time | 
| azure_new_cloudshell_created | Azure New CloudShell Created More details   Azure New CloudShell Created | write_time | 
| azure_pim_setting_changed | Microsoft Entra PIM Setting Changed More details   Microsoft Entra PIM Setting Changed | write_time | 
| azure_privileged_account_assignment_or_elevation | Microsoft Entra Privileged Account Assignment or Elevation More details   Microsoft Entra Privileged Account Assignment or Elevation | write_time | 
| azure_security_config_changed | Azure Security Configuration Changed More details   Azure Security Configuration Changed | write_time | 
| azure_sign_in_failures | Microsoft Entra Sign-in Failure More details   Microsoft Entra Sign-in Failure | write_time | 
| azure_suspicious_changes_to_conditional_access_policy | Microsoft Entra Changes to Conditional Access Policy More details   Microsoft Entra Changes to Conditional Access Policy | write_time | 
| azure_suspicious_sign_in_activity | Microsoft Entra Suspicious Sign-in Activity More details   Microsoft Entra Suspicious Sign-in Activity | write_time | 
| bad_process | Process Anomaly More details   Process AnomalyA process has been launched an anomalously large number of times. Investigate the process and the user to see if this is expected. XDR Kill Chain
 Event NameThe  Severity15 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of times a process ( | timestamp | 
| bad_reputation_login | Bad Reputation Login More details   Bad Reputation LoginA successful login was observed from an IP address with a history of malicious activity. Check with the user. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe login records are checked for every source IP address ( | write_time | 
| carbonblack_edr_anomaly | Carbon Black: XDR Anomaly More details   Carbon Black: XDR AnomalyThe Carbon Black endpoint generates an anomalously high amount of log data or a rarely seen type of log data on the host. Investigate the device and the user, to see if this is expected. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of occurrences of Carbon Black endpoint (cloud) log, based on the “UNKNOWN“ threat category ( | timestamp | 
| cloud_account_login_failure_okta | Account MFA Login Failure Anomaly More details   Account MFA Login Failure AnomalyAn anomalously large number of Multi-Factor Authentication (MFA) user login failures was observed for an account. Check with the user. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity45 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsMulti-Factor  Authentication login failures and successes are calculated periodically for every account ( The Suspicious AWS Login Failure rules are used to identify suspicious AWS account login failures. Any one or more of these will trigger the AWS Cloud Account Login Failure alert type. Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert Types | write_time, write_time | 
| cloud_drive_data_exfiltration_anomaly | Cloud Drive Data Exfiltration Anomaly More details   Cloud Drive Data Exfiltration Anomaly | timestamp | 
| cnc_reputation | Command & Control Reputation Anomaly More details   Command & Control Reputation AnomalyAn anomalously large number of connections were made to known command and control servers. Investigate the connections and source hosts. If malicious, block the IP addresses of the command and control servers. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of connections for every destination IP ( | timestamp | 
| command_anomaly | Command Anomaly More details   Command AnomalyA command has been executed an anomalously large number of times compared to its typical executions or those of other commands. Investigate the command and the user to determine if this is expected. XDR Kill Chain
 Event NameThe  Severity15 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of times a command ( | timestamp | 
| country_communication_anomaly | Outbound Destination Country Anomaly More details   Outbound Destination Country AnomalyA host that typically communicates with a small, consistent number of countries communicated with a new country. Investigate the destination to see if it is benign. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsHosts ( | timestamp | 
| cryptojacking | Cryptojacking More details   CryptojackingAn unauthorized coin miner used a computer to mine cryptocurrency. Consider blocking the source IP address. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an unauthorized coin miner is detected by IDS, an alert is triggered. A sample Interflow includes the IDS signature ( | timestamp | 
| cylance_edr_anomaly | CylanceOPTICS: XDR Anomaly More details   CylanceOPTICS: XDR AnomalyThe Cylance OPTICS endpoint generates an anomalously high amount of log data or a rarely seen type of log data on the host. Investigate the device and the user to see if this is expected. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of occurrences of CylanceOPTICS log records ( | timestamp | 
| dga_resolvable | DGA More details   DGAA host is using a potential Domain Generation Algorithm (DGA). If the target domain is a malicious domain, the host might be compromised. Investigate the DGA domains and the host. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsWhenever a host ( If a monitored host ( | timestamp | 
| dhcp_anomaly | DHCP Server Anomaly More details   DHCP Server AnomalyA new DHCP server appeared in the network. This could be a hacker attempting to steer traffic. Investigate and consider telling employees to avoid this server. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a DHCP server that has never been seen before appears in the network, an alert is triggered. The Interflow includes the destination IP address ( | timestamp | 
| dns_anonymous_file_upload_domains | DNS Query to Anonymous File Upload Domains More details   DNS Query to Anonymous File Upload Domains | write_time | 
| dns_external_service_interaction_domains | DNS Query to External Service Interaction Domains More details   DNS Query to External Service Interaction Domains | write_time | 
| dns_phishing_file_extension_tld | Phishing Domain with File Extension TLD More details   Phishing Domain with File Extension TLD | write_time | 
| dns_pua_cryptocoin_mining_xmr | DNS Query to Monero Crypto Coin Mining Pool Domains More details   DNS Query to Monero Crypto Coin Mining Pool Domains | write_time | 
| dns_tor_proxy_domain | DNS Query to TOR Proxy Domain More details   DNS Query to TOR Proxy Domain | write_time | 
| dns_tunnel | DNS Tunneling Anomaly More details   DNS Tunneling AnomalyAn anomalously large number of connections tunneling high-entropy traffic through DNS were made. This can indicate data exfiltration. Investigate the tunnel and source host. If malicious, block the source host. XDR Kill Chain
 Event NameThe  Severity98 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe DNS queries ( | timestamp | 
| dormant_account | Dormant Account Anomaly More details   Dormant Account Anomaly | write_time | 
| dstip_bad_reps | Bad Destination Reputation Anomaly More details   Bad Destination Reputation AnomalyA destination IP address with a bad reputation has received an anomalously large number of connections. Investigate the connections and consider blocking the destination IP address. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of connections for every destination IP address ( | timestamp | 
| email_recent_domain_correlation | Possible Phishing Site Visit from Email More details   Possible Phishing Site Visit from EmailA user visited a recently registered domain shortly after using email, indicating a possible phishing site visit. Check to see if the site is malicious. If so, check with the user to see if they are compromised. XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a user ( When an alert is triggered, a new correlation event is created. The Interflow includes the reference ID of the original record of the domain visit ( Logic Details of Possible Phishing Site Visit from EmailThe timeframe of the alert type logic is as follows: 
 The domain query and DNS lookups are as follows: 
 The alert generation conditions are as follows: 
 Note that even though the rule runs every 2 hours, the 30-minute time window can be seen as a sliding window without gaps. For example: the rule runs now as a new cycle, but an email action happened during the last run, say 2 hours and 10 minutes ago. If the corresponding recent domain creation event happens in this cycle, say 1 hour and 50 minutes ago, this will also trigger the alert. | timestamp | 
| emerging_threat | Emerging Threat More details   Emerging ThreatAn emerging threat has been observed. Investigate the IP address, domain name, URL, or file hashes (MD5, SHA1, SHA256) XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsStellar Cyber monitors traffic for emerging threats. This alert type has file hash detection that monitors traffic, Syslog, and Windows events. An alert is triggered if emerging threats are observed in any of the following: 
 Note that only one of these is needed to trigger the alert. So, although the Interflow includes the source IP address ( | write_time | 
| encoded_powershell | Encoded PowerShell More details   Encoded PowerShellA Windows host executed an encoded PowerShell script. Investigate the script contents to see if it is malicious. If so, consider quarantining the host. XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a Windows host ( | timestamp | 
| encrypted_phishing_site | Possible Encrypted Phishing Site Visit More details   Possible Encrypted Phishing Site VisitA possible phishing site visit to a recently registered domain was observed in encrypted traffic. Check with the user to determine whether their system is compromised. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an encrypted connection to a recently registered site ( | write_time | 
| exploit_attempt_correlation | Exploited C&C Connection More details   Exploited C&C ConnectionAn exploited host with vulnerabilities initiated a connection to the exploit attacker, which could indicate the host being compromised and performing C&C activities. See if the exploit was successful. Check the source host, and consider blocking. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsTwo events are involved in this alert type. In the first event, an attacker ( When an alert is triggered a new correlation event is generated. The Interflow of the correlation event includes the reference ID of the exploit event ( | timestamp | 
| exploit_attempt_priv_priv | Private to Private Exploit Anomaly More details   Private to Private Exploit AnomalyA private IP address initiated a large number of exploit attempts identified by a given signature or a rarely seen exploit attempt to another private IP address. Investigate that signature. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity75 Alert Subtype: IDS Traffic Anomaly The IDS Traffic Anomaly alert subtype is the same as the Private to Private Exploit Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IDS signatures ( Alert Subtype: IPS Traffic Anomaly The IPS Traffic Anomaly alert subtype is the same as the Private to Private Exploit Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IPS signatures ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| exploit_attempt_priv_pub | Private to Public Exploit Anomaly More details   Private to Public Exploit AnomalyA private IP address initiated a large number of exploit attempts identified by a given signature or a rarely seen exploit attempt to a public IP address. Investigate that signature. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity60 Alert Subtype: IDS Traffic Anomaly The IDS Traffic Anomaly alert subtype is the same as the Private to Public Exploit Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IDS signatures ( Alert Subtype: IPS Traffic Anomaly The IPS Traffic Anomaly alert subtype is the same as the Private to Public Exploit Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IPS signatures ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| exploit_attempt_pub_priv | Public to Private Exploit Anomaly More details   Public to Private Exploit AnomalyA public IP address initiated a large number of exploit attempts identified by a given signature or a rarely seen exploit attempt to a private IP address. Investigate that signature. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity60 Alert Subtype: IDS Traffic Anomaly The IDS Traffic Anomaly alert subtype is the same as the Public to Private Exploit Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IDS signatures ( Alert Subtype: IPS Traffic Anomaly The IPS Traffic Anomaly alert subtype is the same as the Public to Private Exploit Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IPS signatures ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| exploit_attempt_pub_pub | Public to Public Exploit Anomaly More details   Public to Public Exploit AnomalyA public IP address initiated a large number of exploit attempts identified by a given signature or a rarely seen exploit attempt to another public IP address. Investigate that signature. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity50 Alert Subtype: IDS Traffic Anomaly The IDS Traffic Anomaly alert subtype is the same as the Public to Public Exploit Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IDS signatures ( Alert Subtype: IPS Traffic Anomaly The IPS Traffic Anomaly alert subtype is the same as the Public to Public Exploit Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IPS signatures ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_clear_password | External Plain Text Passwords Detected More details   External Plain Text Passwords DetectedA plain text password was detected in unencrypted traffic. Check with the user. This alert type looks for the presence of  XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf there are plain text passwords in unencrypted traffic records with a public source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_cloud_account_login_failure | External Account Login Failure Anomaly More details   External Account Login Failure AnomalyAn anomalously large number of user login failures was observed for an account. Check with the user. This alert type has the following subtypes: This alert type has a detection delay for on-time records while maintaining detection coverage for high latency data sources. High latency data will have a detection delay corresponding to their amount of latency. The expected detection delay is 5-10 minutes, although it could be longer when there is an ingestion delay. Sources without ingestion delays will get their alerts between 5 and 10 minutes after ingestion. XDR Kill Chain
 Event NameThe  Severity45 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsLogin failures and successes are calculated periodically for every account ( Alert Subtype: Office 365 / Entra ID The Office 365 / Entra ID alert subtype is the same as the External Account Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Windows Security Events The Windows Security Events alert subtype is the same as the External Account Login Failure Anomaly alert type above, with the following differences: 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| external_credential_stuffing | External Credential Stuffing More details   External Credential StuffingAn anomalously large amount of username/password testing was observed on AWS, Okta, or Windows. Check the activity after successful logins, and consider blocking the source IP addresses. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsExternal credential stuffing is the constant testing of username/password combinations on the AWS, Okta, or Windows authentication functions. Login activity is monitored and if the number of failed logins is larger than normal for that service, an alert is triggered. The Interflow includes the service ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| external_database_command | External SQL Shell Command More details   External SQL Shell CommandShell commands were observed over a SQL connection, which is a common way hackers try to gain shell access over vulnerable SQL applications. Check with the user. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor SQL query records, if special commands (such as  
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_fw_action | External Firewall Denial Anomaly More details   External Firewall Denial AnomalyA source host had actions blocked by a firewall too many times. Investigate the firewall rules that were violated. If suspicious, block the source IP address. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of firewall denials for every source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_fw_policy_id | External Firewall Policy Anomaly More details   External Firewall Policy AnomalyA rarely triggered firewall policy has been violated. Investigate that policy and track down the violation. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsA firewall policy ID ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_handshake_failure | External Handshake Failure More details   External Handshake FailureThere were too many handshake failures between two hosts, which might indicate port scanning. Check the source host to see if this was expected and, if not, consider blocking the host. XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a host ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_ids_signature_spike | External IDS Signature Spike More details   External IDS Signature SpikeA source IP address transmitted an anomalous number of different IDS signatures. Typically, this indicates host penetration or vulnerability scanning. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IDS signatures ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_malware_activity | External Other Malware More details   External Other MalwareMalware with uncategorized malicious activity was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates malware that cannot be categorized as ransomware, spyware, trojan,  PUA, or adware, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_mysql_anomaly | External SQL Anomaly More details   External SQL AnomalyAn IP address sent an anomalously large number of queries to one or more SQL servers. Investigate the queries. If suspicious, block the source IP address. XDR Kill Chain
 Event NameThe  Severity15 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of SQL queries for every source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_non_std_port_anomaly | External Non-Standard Port Anomaly More details   External Non-Standard Port AnomalyAn application had an anomalously large number of connections or a rarely seen connection on non-standard ports. Check the application to be sure this is benign. XDR Kill Chain
 Event NameThe  Severity15 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of connections for an application ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_password_spray | External Password Spraying More details   External Password Spraying.An anomalously large number of failed logins with unknown user names was observed on external Windows authentication services. Check the activity after successful logins, and consider blocking the source IP addresses. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a potential password spraying attack is observed, an alert is triggered. The Interflow includes a source ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_pii_leak | External PII Leaked More details   External PII LeakedPersonally identifiable information (social security numbers or credit cards) has been observed in the clear. Check the source to see if it is compromised. If so, consider blocking it. XDR Kill Chain
 Event NameThe  Severity90 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a personally identifiable information leak is detected by IDS, an alert is triggered. A sample Interflow includes the IDS signature ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_port_scan | External IP / Port Scan Anomaly More details   External IP / Port Scan AnomalyA host has either generated an anomalous number of connections compared to the typical amount, or has triggered an anomalous number of connection failure responses, in the measured interval. This can indicate that an attacker is scanning for computers or ports to exploit. If the source IP address is internal targeting an external address, check with the user. If the source IP address is external targeting any addresses, it could be a scanning campaign. This alert type has the following subtypes: XDR Kill ChainEvent NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Alert Subtype: Connection Failure Anomaly (Sensor Traffic) The  Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor every unique triplet (source IP address, destination IP address, and destination port) browsed by each source IP address ( Considering that a lateral scan (private to private) is more sensitive than a non-lateral scan, this alert type is divided into two parts. One focuses on lateral scan analysis, the other focuses on non-lateral scan analysis. The mechanism remains the same as before, with the trigger condition for lateral scan alert being more sensitive than non-lateral one. Validation / RemediationIf the source IP address is internal targeting an external address, check with the user if they are aware of the activity or if they are authorized to perform the activity. Inform the user's supervisor if the activity is unauthorized. If the source IP address is external targeting any addresses, check the reputation of the source IP address as in known malicious/scanner. Potential False PositivesSome legitimate activities such as vulnerability scans or penetration testing may trigger this alert type, if from an external IP address to an internal IP address. Alert Subtype: Connection Spike Anomaly (Firewall / Windows Traffic) The  XDR Kill ChainEvent NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor every unique (destination IP address and destination port) browsed by each source IP address ( Considering that a lateral scan (private to private) is more sensitive than a non-lateral scan, this alert type is divided into two parts. One focuses on lateral scan analysis, the other focuses on non-lateral scan analysis. The mechanism remains the same as before, with the trigger condition for lateral scan alert being more sensitive than non-lateral one. Validation / RemediationIf the source IP address is internal targeting an external address, check with the user if they are aware of the activity or if they are authorized to perform the activity. Inform the user's supervisor if the activity is unauthorized. If the source IP address is external targeting any addresses, check the reputation of the source IP address as in known malicious/scanner. Potential False PositivesSome legitimate activities such as vulnerability scans or penetration testing may trigger this alert type, if from an external IP address to an internal IP address. 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time, timestamp | 
| external_protocol_account_login_failure | External Protocol Account Login Failure Anomaly More details   External Protocol Account Login Failure AnomalyAn anomalously large number of login failures over SMB or FTP was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity35 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor every user name ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| external_pua | External PUA More details   External PUAUnwanted applications or malware that bombards the user with advertisements has been observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates potentially unwanted applications (PUA), an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_ransomware | External Ransomware More details   External RansomwareMalware that prevents you from accessing your system or files and demands ransom payment in order to regain access was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates ransomware, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_rdp_bluekeep | External RDP BlueKeep More details   External RDP BlueKeepUse of a scanner by zerosum0x0 that discovers targets vulnerable to BlueKeep (CVE-2019-0708) has been observed. Check the IP address and block if necessary. XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf the scanner by zerosum0x0 is used, an alert is triggered. A sample Interflow includes the IDS signature ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_rdp_brute_force | External RDP Brute Force Attack More details   External RDP Brute Force AttackAn anomalously large number of RDP connections to an RDP server was observed. Check the source IP addresses to determine whether they are unknown or malicious, and monitor any successful RDP logins. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsRDP connection activity is monitored and the number of connections are calculated periodically. If the number of connections to an RDP server ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_rdp_suspicious_outbound | External RDP Suspicious Outbound More details   External RDP Suspicious OutboundNon-standard tools connecting to TCP port 3389 were observed. Check the IP address and block if necessary. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsConnections to TCP port 3389 are monitored, and if non-standard tools connect, an alert is triggered. A sample Interflow includes the source IP address ( 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| external_scan_anomalies | External Scanner Behavior Anomaly More details   External Scanner Behavior AnomalyAn anomalously large amount of scanning behavior or a rarely seen scan behavior was found. Cross-check with the IP / Port Scan Anomaly alert. XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of occurrences of each scanner, based on IDS signature ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_smb_anomaly | External SMB Write Anomaly More details   External SMB Write AnomalyAn IP address sent an anomalously large number of SMB write requests. Investigate the files that the IP address tried to write. If suspicious, block the source IP address. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of SMB write requests for every source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_smb_read_anomaly | External SMB Read Anomaly More details   External SMB Read AnomalyAn IP address sent an anomalously large number of read requests to SMB protocol based service(s). Investigate the files that the IP address tried to read. If suspicious, block the source IP address. XDR Kill Chain
 Event NameThe  Severity15 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of SMB read requests for every source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_smb_user_scan | External SMB Username Enumeration More details   External SMB Username EnumerationAt least 5 different users SMB login attempts and 1 denied attempt or at least 10 different users SMB login attempts, were observed from the same source. Check the source IP address. If malicious, consider blocking it. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf one source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_spyware_activity | External Spyware More details   External SpywareMalware that collects and shares information about a device without consent was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates spyware activity, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_sql_db_dump | External SQL Dumpfile Execution More details   External SQL Dumpfile ExecutionThe SQL  XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf the SQL  
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| external_suspected_malicious_user_agent | External Suspected Malicious User Agent More details   External Suspected Malicious User AgentAn external HTTP connection was made by a user agent that has been identified as potentially malicious. Investigate the connection's destination. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a seen user agent is identified as suspicious, an alert is triggered. The alert includes the suspicious user agent ( Alert Subtype: Predicted Malicious Agent The Predicted Malicious Agent alert subtype is the same as the External Suspected Malicious User Agent alert type above, with the following differences: 
 Alert Subtype: Known Malicious Agent Match The Known Malicious Agent Match alert subtype is the same as the External Suspected Malicious User Agent alert type above, with the following differences: 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_syn_flood | External SYN Flood Victim More details   External SYN Flood VictimA large amount of SYN requests were observed, which can indicate an attempt to consume server resources and make the target unresponsive. Check to see if the host is malicious or compromised. If so, consider blocking the source host. XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an external host ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_syn_flood_attacker | External SYN Flood Attacker More details   External SYN Flood AttackerAn attacker sends a large amount of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an external host ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_trojan_activity | External Trojan More details   External TrojanMalware that disguises itself as legitimate software in order to gain access to a system or files has been observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates trojan activity, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_url_scan | External URL Reconnaissance Anomaly More details   External URL Reconnaissance AnomalyAn anomalous number of HTTP 4xx errors were observed. This can indicate an attacker scanning for pages to exploit. Check with the user. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor every unique URL browsed by each source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| external_user_bytes_sum | External User Data Volume Anomaly More details   External User Data Volume AnomalyA user had an anomalously large volume of traffic compared to its typical volume or that of its peers. Investigate the user to determine if this is expected. Firewall and non-firewall data do not contribute to the same alert, so this alert will have either entirely firewall data or no firewall data. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe total traffic volume of each user identified by user ID ( The Interflow includes the source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_user_login_fail | External User Login Failure Anomaly More details   External User Login Failure AnomalyAn anomalous number of login failures was observed for one of the following applications: SSH, SMTP, FTP, RDP, SMB, databases, Active Directory, Office 365, Okta, AWS CloudTrail, or Google Workspace. For Okta, an anomalous number of multi-factor authentication (MFA) failures was observed. Check with the user. This alert type has the following subtypes: This alert type has a detection delay for on-time records while maintaining detection coverage for high latency data sources. High latency data will have a detection delay corresponding to their amount of latency. The expected detection delay is 5-10 minutes, although it could be longer when there is an ingestion delay. Sources without ingestion delays will get their alerts between 5 and 10 minutes after ingestion. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsLogin failures and successes are calculated periodically for every source ( Alert Subtype: Office 365 / Entra ID The Office 365 / Entra ID alert subtype is the same as the External User Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Source IP Based The Source IP-based alert subtype is the same as the External User Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Destination IP Based The Destination IP-based alert subtype is the same as the External User Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Kerberos Events The Kerberos Events alert subtype is the same as the External User Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Source IP Based Windows Logon Events The Source IP-based Windows Logon Events alert subtype is the same as the External User Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Destination IP Based Windows Logon Events The Destination IP-based Windows Logon Events alert subtype is the same as the External User Login Failure Anomaly alert type above, with the following differences: 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| external_user_success_brute_forcer | External Brute-Forced Successful User Login More details   External Brute-Forced Successful User LoginA successful login was observed from an IP address that had previously seen a large number of login failures, or a successful login to a user account was observed from another IP address or IP addresses that had previously seen a large number of login failures to that account. Check with the user. This alert type has the following subtypes: This alert type has a relatively long detection delay of up to 40 minutes because it waits for login events from high latency data sources and is sensitive to the event order of user logins. XDR Kill Chain
 Event NameThe  Severity90 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Alert Subtype: Source IP Based The source IP-based alert subtype has the same XDR Kill Chain as the user ID-based alert subtype, but differs in the Key Fields and Relevant Data Points and Use Case with Data Points. The  Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe login records are checked for every external source IP address ( 
 A sample Interflow includes the source IP address ( The user ID-based alert subtype has the same XDR Kill Chain as the source IP-based alert subtype, but differs in the Key Fields and Relevant Data Points and Use Case with Data Points. The  Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe login records to a user account ( 
 A sample Interflow includes the source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_user_uncommon_app | External User Application Usage Anomaly More details   External User Application Usage AnomalyA user who typically uses a small, consistent number of applications used a new application. Investigate the application, to see if it is benign. Check with the user to see if this was expected. XDR Kill Chain
 Event NameThe  Severity15 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsAn alert is triggered under the following conditions: 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| external_vuln_exploit_correlation | External Exploited Vulnerability More details   External Exploited VulnerabilityA host with a vulnerability discovered by a security scanning tool was exploited by an attack on that same vulnerability, indicating a high probability of success. Check the target to see if it was compromised. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsAn attacker ( When an alert is triggered, a new correlation event is generated. The Interflow of the correlation event includes the ID of the IDS exploit event ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| file_creation | File Creation Anomaly More details   File Creation AnomalyA file or files were created an anomalously large number of times. Check with the user to see if this is expected. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of file creations for each user ( | timestamp | 
| gsuite_account_manipulation | Google Workspace Account Manipulation More details   Google Workspace Account ManipulationA Google Workspace user was manipulated. Check with the user to make sure this was expected. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each Google Workspace account ( | write_time | 
| gsuite_attack_warning | Google Workspace Attack Warning More details   Google Workspace Attack WarningAttacks to a Google Workspace account were observed. Check with the account holder. XDR Kill Chain
 Event NameThe  Severity74 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each Google Workspace account ( | write_time | 
| gsuite_suspicious_activities | Google Workspace Suspicious Activities More details   Google Workspace Suspicious ActivitiesSuspicious activities were observed in a Google Workspace account. Check with the account holder. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each Google Workspace account ( | write_time | 
| gsuite_user_suspended | Google Workspace User Suspended More details   Google Workspace User SuspendedA Google Workspace user was suspended. Check with the user to make sure this was expected. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each Google Workspace account ( | write_time | 
| hydra_password_guessing_hack_tool | Hydra Password Guessing Hack Tool More details   Hydra Password Guessing Hack ToolA user from a Windows host executed a command-line script that launched either the  XDR Kill Chain
 Event NameThe  Severity90 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThis alert is triggered if a Windows host ( Validation / RemediationCheck the body of the Powershell script that is reported on the Windows host to identify whether the contents of the script are actually malicious. If malicious, consider quarantining the host. Potential False PositivesThe running of any executable named  | timestamp | 
| internal_clear_password | Internal Plain Text Passwords Detected More details   Internal Plain Text Passwords DetectedA plain text password was observed in unencrypted traffic between internal systems. Check with the user. This alert type looks for the presence of  XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf there are plain text passwords in traffic records with a public source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| internal_cloud_account_login_failure | Internal Account Login Failure Anomaly More details   Internal Account Login Failure AnomalyAn anomalously large number of login failures from an internal source IP address to an internal destination IP address was observed for an account. Check with the user. This alert type has the following subtypes: This alert type has a detection delay for on-time records while maintaining detection coverage for high latency data sources. High latency data will have a detection delay corresponding to their amount of latency. The expected detection delay is 5-10 minutes, although it could be longer when there is an ingestion delay. Sources without ingestion delays will get their alerts between 5 and 10 minutes after ingestion. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsLogin failures and successes between any internal IP addresses are calculated periodically for every account ( Alert Subtype: Windows Logon Events The Windows Logon Events alert subtype is the same as the Internal Account Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Kerberos Events The Kerberos Events alert subtype is the same as the Internal Account Login Failure Anomaly alert type above, with the following differences: 
 The NTLM Events alert subtype is the same as the Internal Account Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Hibun Security Logs The Hibun Security Logs alert subtype is the same as the Internal Account Login Failure Anomaly alert type above, with the following differences: 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| internal_credential_stuffing | Internal Credential Stuffing More details   Internal Credential StuffingAn anomalously large amount of username/password testing was observed on an internal Windows authentication service. Check the activity after successful logins, and consider blocking the internal source IP addresses. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsInternal credential stuffing is the constant testing of username/password combinations on the AWS, Okta, or Windows authentication functions. Login activity is monitored and if the number of failed logins is larger than normal for that service, an alert is triggered. The Interflow includes the  service ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| internal_database_command | Internal SQL Shell Command More details   Internal SQL Shell CommandShell commands were observed over a SQL connection, which is a common way hackers try to gain shell access over vulnerable SQL applications. Check with the user. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor SQL query records, if special commands (such as  
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| internal_fw_action | Internal Firewall Denial Anomaly More details   Internal Firewall Denial AnomalyAn internal source host had actions blocked by a firewall too many times. Investigate the firewall rules that were violated. If suspicious, block the internal source IP address. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of firewall denials for every internal source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_fw_policy_id | Internal Firewall Policy Anomaly More details   Internal Firewall Policy AnomalyA rarely triggered firewall policy involving an internal source IP address and internal destination IP address has been violated. Investigate that policy and track down the violation. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsA firewall policy ID ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_handshake_failure | Internal Handshake Failure More details   Internal Handshake FailureThere were too many handshake failures between two internal hosts, which might indicate port scanning. Check the source host to see if this was expected, and if not, consider blocking the host. XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an internal host ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| internal_ids_signature_spike | Internal IDS Signature Spike More details   Internal IDS Signature SpikeA source IP address transmitted an anomalous number of different IDS signatures. Typically, this indicates host penetration or vulnerability scanning. XDR Kill Chain
 Event NameThe  Severity65 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of unique IDS signatures ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_malware_activity | Internal Other Malware More details   Internal Other MalwareMalware with uncategorized malicious activity in internal traffic was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates malware in internal traffic that cannot be categorized as ransomware, spyware, trojan,  PUA, or adware, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_mysql_anomaly | Internal SQL Anomaly More details   Internal SQL AnomalyAn internal IP address sent an anomalously large number of queries to an internal SQL server. Investigate the queries. If suspicious, block the source IP address. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of SQL queries for every internal source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_non_std_port_anomaly | Internal Non-Standard Port Anomaly More details   Internal Non-Standard Port AnomalyAn application had an anomalously large number of connections or a rarely seen connection to an internal IP address on non-standard ports. Check the application to be sure this is benign. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of connections for an application ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_password_spray | Internal Password Spraying More details   Internal Password SprayingAn anomalously large number of failed logins with unknown user names was observed on internal Windows authentication services. Check the activity after successful logins, and consider blocking the internal source IP addresses. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a potential password spraying attack is observed, an alert is triggered. The Interflow includes a source ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_pii_leak | Internal PII Leaked More details   Internal PII LeakedPersonally identifiable information (social security numbers or credit cards) has been observed in internal traffic in the clear. Check the source to see if it is compromised. If so, consider blocking it. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a personally identifiable information leak is detected by IDS, an alert is triggered. A sample Interflow includes the IDS signature ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_port_scan | Internal IP / Port Scan Anomaly More details   Internal IP / Port Scan AnomalyA host has either generated an anomalous number of connections compared to the typical amount, or has triggered an anomalous number of connection failure responses, in the measured interval. This can indicate that an attacker is scanning for computers or ports to exploit. Check with the user. This alert type has the following subtypes: XDR Kill ChainEvent NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Alert Subtype: Connection Failure Anomaly (Sensor Traffic) The  Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each internal source IP address ( Validation / RemediationCheck with the user related to the internal source IP address. Inform the user's supervisor if the activity is unauthorized. Potential False PositivesSome legitimate activities such as vulnerability scans or penetration testing may trigger this alert type. Alert Subtype: Connection Spike Anomaly (Firewall / Windows Traffic) Event NameThe  Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor every unique triplet (source IP address, destination IP address, and destination port) browsed by each source IP address ( Considering that a lateral scan (private to private) is more sensitive than a non-lateral scan, this alert type is divided into two parts. One focuses on lateral scan analysis, the other focuses on non-lateral scan analysis. The mechanism remains the same as before, with the trigger condition for lateral scan alert being more sensitive than non-lateral one. Validation / RemediationCheck with the user related to the internal source IP address. Inform the user's supervisor if the activity is unauthorized. Potential False PositivesSome legitimate activities such as vulnerability scans or penetration testing may trigger this alert type. 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time, timestamp | 
| internal_protocol_account_login_failure | Internal Protocol Account Login Failure Anomaly More details   Internal Protocol Account Login Failure AnomalyAn anomalously large number of login failures between internal IP addresses over SMB or FTP was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor every user name ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| internal_pua | Internal PUA More details   Internal PUAUnwanted applications or malware that bombards the user with advertisements in internal traffic has been observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates potentially unwanted applications (PUA) in internal traffic, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_ransomware | Internal Ransomware More details   Internal RansomwareMalware that prevents you from accessing your system or files and demands ransom payment in order to regain access in internal traffic was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity98 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates ransomware in internal traffic, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_rdp_bluekeep | Internal RDP BlueKeep More details   Internal RDP BlueKeepThe use of a scanner by zerosum0x0 that discovers targets vulnerable to BlueKeep (CVE-2019-0708) has been observed between internal hosts. Check the IP address and block if necessary. XDR Kill Chain
 Event NameThe  Severity90 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf the scanner by zerosum0x0 is used, an alert is triggered. A sample Interflow includes the IDS signature ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_rdp_brute_force | Internal RDP Brute Force Attack More details   Internal RDP Brute Force AttackAn anomalously large number of RDP connections from internal host(s) to an RDP server were observed. Check the source IP addresses to see if they are unknown or malicious, and monitor any successful RDP logins. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsRDP connection activity is monitored and the number of connections calculated periodically. If the number of connections from internal host(s) to an RDP server ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_rdp_suspicious_outbound | Internal RDP Suspicious Outbound More details   Internal RDP Suspicious OutboundNon-standard tools from an internal host connecting to TCP port 3389 in the other internal host were observed. This could indicate lateral movement attempting to establish an RDP connection. Check the IP address and block if necessary. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsConnections to TCP port 3389 are monitored, and if non-standard tools connect, an alert is triggered. A sample Interflow includes the source IP address ( 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_scan_anomalies | Internal Scanner Behavior Anomaly More details   Internal Scanner Behavior AnomalyAn anomalously large amount of scanning behavior or a rarely seen scan behavior between internal hosts was observed. Cross-check with the IP / Port Scan Anomaly alert. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of occurrences of each scanner, based on IDS signature ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_smb_anomaly | Internal SMB Write Anomaly More details   Internal SMB Write AnomalyAn internal IP address sent an anomalously large number of SMB write requests to other internal IP address(es). Investigate the files that the IP address tried to write. If suspicious, block the source IP address. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of SMB write requests to internal IP address(es) for every internal source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_smb_read_anomaly | Internal SMB Read Anomaly More details   Internal SMB Read AnomalyAn internal IP address sent an anomalously large number of read requests to an internal SMB protocol based service(s). Investigate the files that this internal IP address tried to read. If suspicious, block the specific internal source IP address. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of SMB read requests for every internal source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_smb_user_scan | Internal SMB Username Enumeration More details   Internal SMB Username EnumerationAt least 5 different users SMB login attempts and 1 denied attempt or at least 10 different users SMB login attempts, were observed from an internal IP address to other internal IP address(es). Check the source IP address. If malicious, consider blocking it. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an internal source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_spyware_activity | Internal Spyware More details   Internal SpywareMalware that collects and shares information about a device without consent in internal traffic was observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates spyware activity in internal traffic, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_sql_db_dump | Internal SQL Dumpfile Execution More details   Internal SQL Dumpfile ExecutionThe SQL  XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf any SQL  
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_suspected_malicious_user_agent | Internal Suspected Malicious User Agent More details   Internal Suspected Malicious User AgentAn internal HTTP connection was made by a user agent that has been identified as potentially malicious. Investigate the connection's destination. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a seen user agent is identified as suspicious, an alert is triggered. The alert will contain the suspicious user agent ( Alert Subtype: Predicted Malicious Agent The Predicted Malicious Agent alert subtype is the same as the Internal Suspected Malicious User Agent alert type above, with the following differences: 
 Alert Subtype: Known Malicious Agent Match The Known Malicious Agent Match alert subtype is the same as the Internal Suspected Malicious User Agent alert type above, with the following differences: 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_syn_flood | Internal SYN Flood Victim More details   Internal SYN Flood VictimA large amount of SYN requests to an internal target were observed, which can indicate an attempt to consume server resources and make the target unresponsive. Check to see if the host is malicious or compromised. If so, consider blocking the source host. XDR Kill Chain
 Event NameThe  Severity25 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an internal host ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_syn_flood_attacker | Internal SYN Flood Attacker More details   Internal SYN Flood AttackerAn internal attacker sends a large amount of SYN requests to internal target system(s) in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. XDR Kill Chain
 Event NameThe  Severity25 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an internal host ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_trojan_activity | Internal Trojan More details   Internal TrojanMalware that disguises itself as legitimate software in order to gain access to a system or files in internal traffic has been observed. Check with the user. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf ML-IDS or sandbox indicates trojan activity in internal traffic, an alert is triggered. A sample Interflow includes malicious activity for sandbox ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_url_scan | Internal URL Reconnaissance Anomaly More details   Internal URL Reconnaissance AnomalyAn anomalous number of HTTP 4xx errors from an internal IP address to other internal IP addresses were observed. This can indicate an attacker scanning for pages to exploit. Check with the user. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsFor each internal source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| internal_user_bytes_sum | Internal User Data Volume Anomaly More details   Internal User Data Volume AnomalyA user had an anomalously large volume of internal traffic compared to its typical volume or that of its peers. Investigate the user to determine if this is expected. Firewall and non-firewall data do not contribute to the same alert, so this alert will have either entirely firewall data or no firewall data. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe total internal traffic volume of each user identified by user ID ( The Interflow includes the source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_user_login_fail | Internal User Login Failure Anomaly More details   Internal User Login Failure AnomalyAn anomalous number of login failures between internal IP addresses was observed for one of the following applications: SSH, SMTP, FTP, RDP, SMB, databases, Active Directory, Office 365, Okta, AWS CloudTrail, Google Workspace, Salesforce, or Microsoft Entra ID (formerly Azure Active Directory). Check with the user. This alert type has the following subtypes: This alert type has a detection delay for on-time records while maintaining detection coverage for high latency data sources. High latency data will have a detection delay corresponding to their amount of latency. The expected detection delay is 5-10 minutes, although it could be longer when there is an ingestion delay. Sources without ingestion delays will get their alerts between 5 and 10 minutes after ingestion. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsLogin failures and successes between internal IP addresses are calculated periodically for every source ( Alert Subtype: Source IP Based The Source IP-based alert subtype is the same as the Internal User Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Destination IP Based The Destination IP-based alert subtype is the same as the Internal User Login Failure Anomaly alert type above, with the following differences: 
 The NTLM Events alert subtype is the same as the Internal User Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Kerberos Events The Kerberos Events alert subtype is the same as the Internal User Login Failure Anomaly alert type above, with the following differences: 
 Alert Subtype: Windows Logon Events The Windows Logon Events alert subtype is the same as the Internal User Login Failure Anomaly alert type above, with the following differences: 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | write_time | 
| internal_user_success_brute_forcer | Internal Brute-Forced Successful User Login More details   Internal Brute-Forced Successful User LoginA successful login was observed from an IP address that had previously seen a large number of login failures, or a successful login to a user account was observed from another IP address or IP addresses that had previously seen a large number of login failures to that account. Check with the user. This alert type has the following subtypes: This alert type has a relatively long detection delay of up to 40 minutes because it waits for login events from high latency data sources and is sensitive to the event order of user logins. XDR Kill Chain
 Event NameThe  Severity95 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Alert Subtype: Source IP Based The source IP-based alert subtype has the same XDR Kill Chain as the user ID-based alert subtype, but differs in the Key Fields and Relevant Data Points and Use Case with Data Points. The  Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe login records to an internal IP address ( 
 A sample Interflow includes the source IP address ( The user ID-based alert subtype has the same XDR Kill Chain as the source IP-based alert subtype, but differs in the Key Fields and Relevant Data Points and Use Case with Data Points. The  Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe login records to a user account ( 
 A sample Interflow includes the source IP address ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_user_uncommon_app | Internal User Application Usage Anomaly More details   Internal User Application Usage AnomalyAn internal user who usually runs a few applications with internal service IP addresses suddenly runs a new application. Investigate the application to see if it is benign. Check with the user to see if this was expected. XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsAn alert is triggered under the following conditions: 
 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| internal_vuln_exploit_correlation | Internal Exploited Vulnerability More details   Internal Exploited VulnerabilityA host with a vulnerability discovered by a security scanning tool was exploited by an attack on that same vulnerability, indicating a high probability of success. Check the target to see if it was compromised. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsAn attacker ( When an alert is triggered, a new correlation event is generated. The Interflow of the correlation event includes the ID of the IDS exploit event ( 
  More on Internal versus External and Inbound vs Outbound Stellar Cyber reports both internal and external versions of some alerts, with
		 different analysis and recommended actions for each. Similarly, IDS signatures report the direction of data flow as  
 | timestamp | 
| ips_signature_spike_priv_priv | Private to Private IPS Signature Spike More details   Private to Private IPS Signature Spike | timestamp | 
| ips_signature_spike_priv_pub | Private to Public IPS Signature Spike More details   Private to Public IPS Signature Spike | timestamp | 
| ips_signature_spike_pub_priv | Public to Private IPS Signature Spike More details   Public to Private IPS Signature Spike | timestamp | 
| ips_signature_spike_pub_pub | Public to Public IPS Signature Spike More details   Public to Public IPS Signature Spike | timestamp | 
| long_session_anomaly | Long App Session Anomaly More details   Long App Session AnomalyAn application had an anomalously long session compared to its typical session length or that of its peers. Investigate the application to see if this session was expected. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsEvery application's ( | timestamp | 
| mal_access | Malicious Site Access More details   Malicious Site AccessA host accessed a URL with a reputation for potentially hosting malware. Check the URL and, if malicious, consider blocking it. Check the host for compromise. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsWhen a host ( | write_time | 
| malware_on_disk | Malware on Disk More details   Malware on DiskMalicious software or a potentially unwanted application was found on a device and reported as not cleaned. Check with the user. XDR Kill Chain
 Event NameThe  Severity90 (Windows Defender) Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf either of the following occurs, an alert is triggered: 
 A sample Interflow includes the computer name ( | write_time | 
| microsoft_entra_app_deleted | Microsoft Entra Application Deleted More details   Microsoft Entra Application Deleted | write_time | 
| microsoft_entra_hybrid_health_adfs_new_server | Microsoft Entra Hybrid Health AD FS New Server More details   Microsoft Entra Hybrid Health AD FS New Server | write_time | 
| microsoft_entra_hybrid_health_adfs_service_deleted | Microsoft Entra Hybrid Health AD FS Service Deleted More details   Microsoft Entra Hybrid Health AD FS Service Deleted | write_time | 
| microsoft_entra_owner_removed_from_app | Microsoft Entra Owner Removed from Application More details   Microsoft Entra Owner Removed from Application | write_time | 
| mimikatz_dcsync | Mimikatz DCSync More details   Mimikatz DCSyncAn attempt to replicate Active Directory for the first time on a domain controller, or the first time by that account, has occurred. Evaluate whether the replication is intended and, if not, consider disabling the account involved in the replication and investigate for further signs of compromise. XDR Kill Chain
 Event NameThe  Severity90 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThis alert is triggered when  replication of an Active Directory domain controller ( Validation / RemediationTo triage an alert of this type, consider first verifying whether the Active Directory replication event was expected. If the replication is not intended, then the alert has indicated that a DCSync attack is highly likely. This attack can be very severe, because all password hashes stored on the targeted domain controller might have been dumped. Disable the account involved in the replication as soon as possible and further investigate the account for any signs of compromise. There is no simple remediation for a confirmed DCSync attack. Evaluate the overall risks of credential leakage and apply appropriate corrective actions, including minimizing accounts with permissions to perform Active Directory replication, and forcing a change of credentials for accounts with weak passwords. Potential False PositivesThe following will trigger an alert: 
 | timestamp | 
| mimikatz_mem_scan | Mimikatz Credential Dump More details   Mimikatz Credential DumpA potential Mimikatz memory dump was observed. Check the process to determine whether the host is compromised. Consider quarantining the host. XDR Kill Chain
 Event NameThe  Severity90 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data Points If a process ( | write_time | 
| network_security_bloodhound_enumeration_activity | BloodHound Enumeration Activity More details   BloodHound Enumeration Activity | write_time | 
| network_security_impacket_secretdump | Possible Impacket SecretDump Remote Activity More details   Possible Impacket SecretDump Remote Activity | write_time | 
| network_security_net_share_obj_susp_desktop_ini | Windows Network Access Suspicious desktop.ini Action More details   Windows Network Access Suspicious desktop.ini Action | write_time | 
| network_security_petitpotam_network_share | Possible PetitPotam Coerce Authentication Attempt More details   Possible PetitPotam Coerce Authentication Attempt | write_time | 
| network_security_protected_storage_service_access | Protected Storage Service Access More details   Protected Storage Service Access | write_time | 
| network_security_win_group_policy_iniscript | Startup/Logon Script Added to Group Policy Object More details   Startup/Logon Script Added to Group Policy Object | write_time | 
| network_security_win_security_atsvc_task | Remote Task Creation via ATSVC Named Pipe More details   Remote Task Creation via ATSVC Named Pipe | write_time | 
| network_security_win_security_dce_rpc_smb_spoolss_named_pipe | DCERPC SMB Spoolss Named Pipe More details   DCERPC SMB Spoolss Named Pipe | write_time | 
| network_security_win_security_gpo_scheduledtasks | Persistence and Execution at Scale via GPO Scheduled Task More details   Persistence and Execution at Scale via GPO Scheduled Task | write_time | 
| network_security_win_security_impacket_psexec | Impacket PsExec Execution More details   Impacket PsExec Execution | write_time | 
| network_security_win_security_impacket_psexec | Suspicious PsExec Execution More details   Suspicious PsExec Execution | write_time | 
| network_security_win_security_svcctl_remote_service | Remote Service Activity via SVCCTL Named Pipe More details   Remote Service Activity via SVCCTL Named Pipe | write_time | 
| network_security_win_security_wmiprvse_wbemcomn_dll_hijack | T1047 Wmiprvse Wbemcomn DLL Hijack More details   T1047 Wmiprvse Wbemcomn DLL Hijack | write_time | 
| network_uncommon_app | Uncommon Application Anomaly More details   Uncommon Application AnomalyPrivate (internal assets) to public (Internet) traffic has revealed an application that has never been seen before (or been seen very rarely). Investigate that application and ensure that it is benign. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an application ( | timestamp | 
| network_uncommon_process | Uncommon Process Anomaly More details   Uncommon Process AnomalyAn asset launched a process that has never been seen before (or has very rarely been seen). This could indicate a malware attack. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a process ( | timestamp | 
| new_registered_domain | Recently Registered Domains More details   Recently Registered DomainsA DNS request was observed for a site that was registered less than 90 days ago. Check the domain. If suspicious, notify users. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a domain has been registered within the last 90 days, an alert is triggered. A sample Interflow includes the domain name ( | write_time | 
| oci_discovery_activity | OCI Discovery Activity More details   OCI Discovery Activity | write_time | 
| oci_insecure_metadata_endpoint | OCI Insecure Metadata Endpoint More details   OCI Insecure Metadata Endpoint | write_time | 
| oci_insecure_nfs_export_configuration | OCI Insecure NFS Export Configuration More details   OCI Insecure NFS Export Configuration | write_time | 
| oci_instance_metadata_access | OCI Instance Metadata Access More details   OCI Instance Metadata Access | write_time | 
| oci_unexpected_user_agent | OCI Unexpected User Agent More details   OCI Unexpected User Agent | write_time | 
| office365_admin_audit_logging_disabled | Office 365 Admin Audit Logging Disabled More details   Office 365 Admin Audit Logging DisabledOffice 365 admin audit logging was disabled. Make sure this change was expected. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 monitors each Office 365 account ( | write_time | 
| office365_content_filter_policy_changed | Office 365 Content Filter Policy Changed More details   Office 365 Content Filter Policy ChangedThe Microsoft Exchange content policy was changed. An overly permissive content policy can allow spammers to send your organization unwanted email. Make sure this change was expected. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 monitors all Office 365 accounts ( | write_time | 
| office365_malware_filter_policy_changed | Office 365 Malware Filter Policy Changed More details   Office 365 Malware Filter Policy ChangedThe Microsoft Exchange malware filter policy changed. An overly permissive malware filter policy can allow attackers to send malicious attachments to your organization. Make sure this change was expected. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 monitors all Office 365 accounts ( | write_time | 
| office365_multi_file_restore | Office 365 Multiple Files Restored More details   Office 365 Multiple Files RestoredOffice 365 observed that multiple files were restored in a short period. Check with the user. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 periodically checks file restore records. If multiple file restore records are detected within a short period, an alert is triggered. A sample Interflow includes the Office 365 account ID ( | write_time | 
| office365_multi_user_deleted | Office 365 Multiple Users Deleted More details   Office 365 Multiple Users DeletedOffice 365 observed that multiple users were deleted in a short period. Check with the user. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 periodically checks user deletion records. If multiple users were deleted within a short period, an alert is triggered. A sample Interflow includes the Office 365 account ID ( | write_time | 
| office365_outside_entity_file_sharing | Office 365 File Sharing with Outside Entities More details   Office 365 File Sharing with Outside EntitiesAn Office 365 account shared multiple files with entities outside of the organization. Check with the user to make sure this was expected. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 monitors sharing with outside entities for each Office 365 account ( | write_time | 
| office365_password_policy_changed | Office 365 Password Policy Changed More details   Office 365 Password Policy ChangedOffice 365 identified a change to the organization's password policy, which is uncommon. Make sure this was expected. XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 monitors all Office 365 accounts ( | write_time | 
| office365_security_conf_changed | Office 365 Network Security Configuration Changed More details   Office 365 Network Security Configuration ChangedOffice 365 identified a change to your organization's network security configuration, which is uncommon. Make sure this was expected. XDR Kill Chain
 Event NameThe  Severity70 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 monitors all Office 365 accounts ( | write_time | 
| office365_sharing_policy_changed | Office 365 Sharing Policy Changed More details   Office 365 Sharing Policy ChangedOffice 365 identified a change to your organization's sharing policy, which is uncommon. Make sure this was expected. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 monitors all Office 365 accounts ( | write_time | 
| office365_user_network_admin_changed | Office 365 User Network Admin Changed More details   Office 365 User Network Admin ChangedThe Office 365 account’s network admin information was changed. Make sure this change was expected. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsOffice 365 monitors the network admin information for each Office 365 account ( | write_time | 
| outbytes_anomaly | Outbytes Anomaly More details   Outbytes AnomalyA source IP address transmitted an anomalously high amount of outbound traffic to one or multiple destination addresses in a 5 minute interval. This could indicate data exfiltration. Firewall and non-firewall data do not contribute to the same alert, so this alert will have either entirely firewall data or no firewall data. XDR Kill Chain
 Event NameThe  Severity35 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsEvery source host's ( | timestamp | 
| parent_child | Abnormal Parent / Child Process More details   Abnormal Parent / Child ProcessA process that typically launches a small, consistent number of child processes has launched a new child process. Investigate the new child process or the parent process to see if it is benign. This alert type has the following subtype categories: XDR Kill Chain
 Event NameThe  Severity25 Alert Subtype: Machine Learning Anomaly Detection The  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsEach pair of parent/child processes ( Alert Subtype: Rule Based Detection The Parent/Child Suspicious Process Creation rules are used to identify suspicious activity with parent/child relationships associated with process creation. Any one or more of these will trigger the Parent/Child Suspicious Process Creation alert types. Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Parent/Child Suspicious Process Creation Alert Type | timestamp, write_time | 
| password_cracking_with_hashcat | Password Cracking With Hashcat More details   Password Cracking with HashcatA user from a Windows host executed a command-line script that launched either the  XDR Kill Chain
 Event NameThe  Severity90 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThis alert is triggered if a Windows host ( Validation / RemediationCheck the body of the Powershell script that is reported on the Windows host to identify whether the contents are actually malicious. If malicious, consider quarantining the host. Potential False PositivesThe running of any executable named  | timestamp | 
| password_reset_by_user_account | Password Reset By User Account More details   Password Reset By User Account | write_time | 
| password_resets_anomaly | Password Resets Anomaly More details   Password Resets Anomaly | timestamp | 
| password_spraying_attempts_using_dsacls | Password Spraying Attempts Using Dsacls More details   Password Spraying Attempts Using Dsacls A user from a Windows host executed a command-line script to launch a command that by name and parameter list indicates an attempt to abuse  XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThis alert is triggered if a Windows host ( Validation / RemediationCheck whether the usage was actually malicious. If so, consider quarantining the Windows host. Potential False PositivesThis alert could be triggered even if the use is a legitimate use of  | timestamp | 
| phishing | Phishing URL More details   Phishing URLA connection to a site with a phishing reputation was observed. Check with the user to determine whether their system is compromised. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a connection from a source ( | timestamp | 
| powershell_cnc | PowerShell Remote Access More details   PowerShell Remote AccessA Windows host executed a PowerShell script interacting with a remote host. Investigate the script and the remote host to determine whether the script is malicious. If so, consider quarantining the host. XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a Windows host ( | write_time | 
| pripub_appid | Application Usage Anomaly More details   Application Usage AnomalyAn internal application had an anomalously large number of connections to one or more external hosts in a measured interval, exceeding 99.99% of all other intervals corresponding to different applications in the past two weeks. Investigate the application and connections, and consider blocking connections from the application. XDR Kill Chain
 Event NameThe  Severity15 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsEvery application's ( | timestamp | 
| ransomware_delete_backup_catalogs | Backup Catalogs Deleted by Ransomware More details   Backup Catalogs Deleted by RansomwareThe  XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf  | write_time | 
| ransomware_volume_shadow_copy_deletion_via_vssadminedit | Volume Shadow Copy Deletion via VssAdmin More details   Volume Shadow Copy Deletion via VssAdminThe  XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf  | write_time | 
| ransomware_volume_shadow_copy_deletion_via_wmicredit | Volume Shadow Copy Deletion via WMIC More details   Volume Shadow Copy Deletion via WMICThe  XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf  | write_time | 
| rdp_outbytes_anomaly | RDP Outbytes Anomaly More details   RDP Outbytes AnomalyAn internal host transferred an anomalously high amount of data to external host(s) through RDP. This could indicate data exfiltration. Check with the user. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsEvery destination host's ( | timestamp | 
| rdp_port_opening | RDP Port Opening More details   RDP Port OpeningNetsh commands to open TCP port 3389 were observed. This could indicate Sarwent malware attempting to establish an RDP connection. Check the IP address and block if necessary. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsCommands that open TCP port 3389 are monitored, and if netsh commands are seen, an alert is triggered. A sample Interflow includes the source IP address ( | write_time | 
| rdp_registry_modification | RDP Registry Modification More details   RDP Registry ModificationModifications of the property values of  XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe property values of  | write_time | 
| rdp_reverse_tunnel | RDP Reverse Tunnel More details   RDP Reverse TunnelAn  XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an svchost hosting RDP termsvcs communicating with the loopback address is found on TCP port 3389, an alert is triggered. A sample Interflow includes the host IP address ( | write_time | 
| rdp_session_hijacking | RDP Session Hijacking More details   RDP Session HijackingA suspicious RDP session using  XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an RDP session redirect using  | write_time | 
| rdp_settings_hijack | RDP Settings Hijacking More details   RDP Settings HijackingChanges to RDP terminal services settings were observed. Check the IP address and block if necessary. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsRDP terminal service settings are monitored, and if changes are found to these settings, an alert is triggered. A sample Interflow includes the source IP address ( | write_time | 
| rdp_suspicious_logon | RDP Suspicious Logon More details   RDP Suspicious LogonAn RDP logon with a local source IP address was observed. This could indicate a tunneled logon. Check with the user. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsRemote desktop logins are monitored, and if a local source IP address is seen, an alert is triggered. A sample Interflow includes the source IP address ( | write_time | 
| rdp_suspicious_logon_attempt | RDP Suspicious Logon Attempt More details   RDP Suspicious Logon AttemptAn authenticated user who is not allowed to log on remotely has attempted to connect through RDP. Check with the user. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsWindows remote desktop logins are monitored, and if a user who is not allowed to remotely  log in tries to log in with RDP, an alert is triggered. A sample Interflow includes the source IP address ( | write_time | 
| scanner_rep | Scanner Reputation Anomaly More details   Scanner Reputation AnomalyAn anomalously large amount of connections were observed from an IP address with a reputation of being a scanner. Cross-check with the IP / Port Scan Anomaly alert, and check the links and content for possible spam or phishing. XDR Kill Chain
 Event NameThe  Severity20 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of connections from a source IP address ( | timestamp | 
| smb_hack_smbexec | SMB Specific Service Installation More details   SMB Specific Service InstallationA specific service installation used by the Impacket tool or Metasploit was observed. Check the source host. If malicious, consider blocking the host. XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a Windows host ( | write_time | 
| smb_impacket_lateralization | SMB Impacket Lateralization More details   SMB Impacket LateralizationThe execution of  XDR Kill Chain
 Event NameThe  Severity80 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a Windows host ( | write_time | 
| smb_suspicious_copy | SMB Suspicious Copy More details   SMB Suspicious CopyA suspicious copy command from a remote C$ or ADMIN$ share was observed. Check the source host. If malicious, consider blocking the host. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf a Windows host ( | write_time | 
| srcip_bad_reps | Bad Source Reputation Anomaly More details   Bad Source Reputation AnomalyA source IP address with a bad reputation has made an anomalously large number of connections. Investigate the connections and consider blocking the source IP address. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsThe number of connections for every source IP address ( | timestamp | 
| ssl_certificate | Encrypted C&C More details   Encrypted C&CA connection to or from known command and control servers was observed in encrypted traffic. Consider blocking the source IP address. XDR Kill Chain
 Event NameThe  Severity75 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf known command and control servers are detected on either side of a connection with encrypted traffic, an alert is triggered. The Interflow includes the source IP address ( | timestamp | 
| suspicious_azure_account_permission_elevation | Suspicious Azure Account Permission Elevation More details   Suspicious Azure Account Permission Elevation | write_time | 
| suspicious_azure_deployment_activity | Suspicious Azure Deployment Activity More details   Suspicious Azure Deployment Activity | write_time | 
| suspicious_azure_device_activity | Suspicious Microsoft Entra Device Activity More details   Suspicious Microsoft Entra Device Activity | write_time | 
| suspicious_azure_firewall_activity | Suspicious Azure Firewall Activity More details   Suspicious Azure Firewall Activity | write_time | 
| suspicious_azure_key_vault_activity | Suspicious Azure Key Vault Activity More details   Suspicious Azure Key Vault Activity | write_time | 
| suspicious_azure_kubernetes_activity_credential_access | Suspicious Azure Kubernetes Activity: Credential Access More details   Suspicious Azure Kubernetes Activity: Credential Access | write_time | 
| suspicious_azure_kubernetes_activity_defense_evasion | Suspicious Azure Kubernetes Activity: Defense Evasion More details   Suspicious Azure Kubernetes Activity: Defense Evasion | write_time | 
| suspicious_azure_kubernetes_activity_impact | Suspicious Azure Kubernetes Activity: Impact More details   Suspicious Azure Kubernetes Activity: Impact | write_time | 
| suspicious_azure_kubernetes_activity_persistence | Suspicious Azure Kubernetes Activity: Persistence More details   Suspicious Azure Kubernetes Activity: Persistence | write_time | 
| suspicious_azure_kubernetes_activity_privilege_escalation | Suspicious Azure Kubernetes Activity: Privilege Escalation More details   Suspicious Azure Kubernetes Activity: Privilege Escalation | write_time | 
| suspicious_azure_network_activity | Suspicious Azure Network Activity More details   Suspicious Azure Network Activity | write_time | 
| suspicious_azure_service_principal_activity | Suspicious Microsoft Entra Service Principal Activity More details   Suspicious Microsoft Entra Service Principal Activity | write_time | 
| suspicious_commandline | Suspicious Process Creation Commandline More details   Suspicious Process Creation CommandlineThe Suspicious Process Creation Commandline rules are used to identify suspicious activity relating to command-line process creation. Any one or more of these will trigger the Suspicious Process Creation Commandline alert types. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Process Creation Commandline Alert Type | write_time | 
| suspicious_ldap | Suspicious LDAP Search Request More details   Suspicious LDAP Search Request | timestamp | 
| suspicious_oci_bucket_enumeration | Suspicious OCI Bucket Enumeration More details   Suspicious OCI Bucket Enumeration | write_time | 
| suspicious_oci_bucket_public_access_type_configuration | Suspicious OCI Bucket Public Access Type Configuration More details   Suspicious OCI Bucket Public Access Type Configuration | write_time | 
| suspicious_oci_configuration_change_to_network_security_group | Suspicious Configuration Change to OCI Network Security Group More details   Suspicious Configuration Change to OCI Network Security Group | write_time | 
| suspicious_oci_event_rule_deletion | Suspicious OCI Event Rule Deletion More details   Suspicious OCI Event Rule Deletion | write_time | 
| suspicious_oci_iam_activity_impact | Suspicious OCI IAM Activity: Impact More details   Suspicious OCI IAM Activity: Impact | write_time | 
| suspicious_oci_iam_activity_persistence | Suspicious OCI IAM Activity: Persistence More details   Suspicious OCI IAM Activity: Persistence | write_time | 
| suspicious_oci_inbound_ssh_connection | Suspicious OCI Inbound SSH Connection More details   Suspicious OCI Inbound SSH Connection | write_time | 
| suspicious_oci_instance_activity | Suspicious OCI Instance Activity More details   Suspicious OCI Instance Activity | write_time | 
| suspicious_oci_instance_image_export | Suspicious OCI Instance Image Export More details   Suspicious OCI Instance Image Export | write_time | 
| suspicious_oci_kubernetes_activity | Suspicious OCI Kubernetes Activity More details   Suspicious OCI Kubernetes Activity | write_time | 
| suspicious_oci_logging_activity | Suspicious OCI Logging Activity More details   Suspicious OCI Logging Activity | write_time | 
| suspicious_oci_modification_of_route_table | Suspicious Modification of OCI Route Table More details   Suspicious Modification of OCI Route Table | write_time | 
| suspicious_oci_object_storage_activity | Suspicious OCI Object Storage Activity More details   Suspicious OCI Object Storage Activity | write_time | 
| suspicious_oci_scanning_activity | Suspicious OCI Scanning Activity More details   Suspicious OCI Scanning Activity | write_time | 
| suspicious_oci_security_service_impairment | Suspicious OCI Security Service Impairment More details   Suspicious OCI Security Service Impairment | write_time | 
| suspicious_powershell_script | Suspicious Powershell Script More details   Suspicious Powershell ScriptThe Suspicious PowerShell Script rules are used to identify suspicious activity relating to PowerShell scripts. Any one or more of these will trigger the Suspicious PowerShell Script alert types. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious PowerShell Script Alert Type | write_time | 
| suspicious_process_access_lsass | Suspicious LSASS Process Access More details   Suspicious LSASS Process Access | write_time | 
| suspicious_windows_network_connection | Suspicious Windows Network Connection More details   Suspicious Windows Network Connection | write_time | 
| suspicious_windows_registry_event_impact | Suspicious Windows Registry Event: Impact More details   Suspicious Windows Registry Event: Impact | write_time | 
| suspicious_windows_registry_event_persistence | Suspicious Windows Registry Event: Persistence More details   Suspicious Windows Registry Event: Persistence | write_time | 
| traffic_icmp_exfiltration | ICMP Based Exfiltration or Tunneling More details   ICMP Based Exfiltration or Tunneling | write_time | 
| unencrypted_phishing_site | Possible Unencrypted Phishing Site Visit More details   Possible Unencrypted Phishing Site VisitA possible phishing site visit to a recently registered domain was observed in unencrypted traffic. Check with the user to determine whether their system is compromised. XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsIf an unencrypted connection to a recently registered site ( | write_time | 
| user_asset_access | User Asset Access Anomaly More details   User Asset Access AnomalyA user who typically uses a small, consistent number of assets was observed in Windows logons, Kerberos service tickets, or SMB traffic to access a new asset. Investigate the asset and user to see if this was expected. This alert type has the following subtypes: XDR Kill Chain
 Event NameThe  Severity30 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsUsers ( The user is identified with the  The SMB User Based alert subtype is the same as the User Asset Access Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Alert Subtype: Kerberos TGS Requests The Kerberos TGS Requests alert subtype is the same as the User Asset Access Anomaly alert type above, with the following differences: 
 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 | timestamp | 
| user_impossible_travel | Impossible Travel Anomaly More details   Impossible Travel AnomalyA user logged in from locations that are geographically impossible to travel between in the time frame. Check with the user. This alert type has a detection delay for on-time records while maintaining detection coverage for high latency data sources. High latency data will have a detection delay corresponding to their amount of latency. The expected detection delay is 5-10 minutes, although it could be longer when there is an ingestion delay. Sources without ingestion delays will get their alerts between 5 and 10 minutes after ingestion. For the Impossible Travel Anomaly, there are two chances for ingestion delay, so the slowest of the two records will define the delay. This alert type is also sensitive to the order of user logins. The Impossible Travel Anomaly employs frequent location alert suppression to address common false positive alert scenarios. If a user is known to frequently visit the travel destination, the alert will be suppressed. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 
 About srcip and srcip2: For any given travel, there is a source and a destination, which are defined by timestamp, so the source timestamp is less than the destination timestamp. Since the destination record arrives later than the source record, the destination is used as the basis for the alert. This means that  Use Case with Data PointsLogin events (event 1 and event 2) are examined for a user ( Event 1 is the basis for the Interflow. The  | write_time | 
| user_login_region | User Login Location Anomaly More details   User Login Location AnomalyA login to a user account occurred from a source IP address that is anomalously distant from the nearest location typically observed for logins to that user account. This alert type has a detection delay for on-time records while maintaining detection coverage for high latency data sources. High latency data will have a detection delay corresponding to their amount of latency. The expected detection delay is 5-10 minutes, although it could be longer when there is an ingestion delay. Sources without ingestion delays will get their alerts between 5 and 10 minutes after ingestion. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsSuccessful login events for certain login types ( Location History Retention | write_time | 
| user_login_time | Login Time Anomaly More details   Login Time AnomalyA user logged in at an abnormal time. Check with the user. This alert type has a detection delay for on-time records while maintaining detection coverage for high latency data sources. High latency data will have a detection delay corresponding to their amount of latency. The expected detection delay is 5-10 minutes, although it could be longer when there is an ingestion delay. Sources without ingestion delays will get their alerts between 5 and 10 minutes after ingestion. This alert type reads the System Timezone in Global Settings and puts the timezone into the alert descriptions. (In Global Settings, set your timezone relative to UTC.) When a Login Time Anomaly occurs, the timezone is bound to the alert description with the following priorities: 
 XDR Kill Chain
 Event NameThe  Severity40 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsEvery user's ( | write_time | 
| user_uncommon_process | User Process Usage Anomaly More details   User Process Usage AnomalyA user who typically executes a small, consistent number of processes suddenly executed a new process. Investigate the process to see if it is benign. Check with the user to see if this process was expected. XDR Kill Chain
 Event NameThe  Severity10 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Use Case with Data PointsLooks for a user ( The user is identified with the  | timestamp | 
| waf_internal_attacker | WAF Internal Attacker Anomaly More details   WAF Internal Attacker AnomalyInternal web requests from a private IP address have been blocked/alerted by the Web Application Firewall (WAF). Investigate the source requester and ensure they are not compromised. XDR Kill Chain
 Event NameThe  Severity60 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 The above fields are standardized to support a variety of WAFs. The original fields, listed below, remain in the F5 WAF Interflow record for backward compatibility. Use Case with Data PointsIf web requests (f5.uri) from an internal IP address (srcip) to a web application (f5.web_application_name) have been blocked/alerted (f5.request_status) by the WAF, an alert is triggered. The Interflow includes the level of severity (f5.severity), the attack type (f5.attack_type), and the violation information (f5.violations), as well as signature name (f5.sig_names), staged signature name (f5.staged_sig_names), sub violation information (f5.sub_violations), and threat campaign name (f5.violation_details_xml.request-violations.violation.threat_campaign_data.threat_campaign_name), if applicable. If web requests ( Ingestion Types Supported for this Alert
 | timestamp | 
| waf_rule_violation | WAF Rule Violation Anomaly More details   WAF Rule Violation AnomalyWeb requests have been blocked/alerted by the Web Application Firewall (WAF) due to a surge in violations or violating a rule that is rarely invoked. Investigate the blocked/alerted web requests and ensure they are benign. Refer to Log Parser Portsfor the most current list of WAF parsers. XDR Kill Chain
 Event NameThe  Severity50 Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 The above fields are standardized to support a variety of WAFs. The original fields, listed below, remain in the F5 WAF Interflow record for backward compatibility. Use Case with Data PointsIf web requests ( Ingestion Types Supported for this Alert
 | timestamp | 
| windows_security_ad_sensitive_attribute_modification | Sensitive Windows Active Directory Attribute Modification More details   Sensitive Windows Active Directory Attribute ModificationThe Sensitive Windows Active Directory Attribute Modification rules are used to identify suspicious activity with sensitive Windows Active Directory attribute modification. Any one or more of these will trigger the Sensitive Windows Active Directory Attribute Modification alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Sensitive Windows Active Directory Attribute Modification Alert Type | write_time | 
| windows_security_ad_suspicious_operation | Suspicious Windows Active Directory Operation More details   Suspicious Windows Active Directory OperationThe Suspicious Windows Active Directory Operation rules are used to identify suspicious activity with Windows Active Directory operation. Any one or more of these will trigger the Suspicious Windows Active Directory Operation alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Windows Active Directory Operation Alert Type | write_time | 
| windows_security_malicious_event | Potentially Malicious Windows Event More details   Potentially Malicious Windows EventThe Potentially Malicious Windows Event rules are used to identify suspicious activity with Windows events. This is a generic rule name. Any one or more of these will trigger the Potentially Malicious Windows Event alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Potentially Malicious Event Alert Type | write_time | 
| windows_security_object_access_suspicious_attempt | Suspicious Access Attempt to Windows Object More details   Suspicious Access Attempt to Windows ObjectThe Suspicious Access Attempt to Windows Object rules are used to identify suspicious activity with access attempt to Windows objects. Any one or more of these will trigger the Suspicious Access Attempt to Windows Object alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Access Attempt to Windows Object Alert Type | write_time | 
| windows_security_sensitive_networkshare | Sensitive Windows Network Share File or Folder Accessed More details   Sensitive Windows Network Share File or Folder AccessedThe Sensitive Windows Network Share File or Folder Accessed rules are used to identify suspicious activity with Windows network share file or folder access. Any one or more of these will trigger the Sensitive Windows Network Share File or Folder Accessed alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Sensitive Windows Network Share File or Folder Accessed Alert Type | write_time | 
| windows_security_steal_or_forge_kerberos_tickets | Steal or Forge Kerberos Tickets More details   Steal or Forge Kerberos Tickets | write_time | 
| windows_security_suspicious_activity_related_to_security_enabled_group | Suspicious Activity Related to Security-Enabled Group More details   Suspicious Activity Related to Security-Enabled GroupThe Suspicious Activity Related to Security-Enabled Group rules are used to identify suspicious activity related to security-enabled groups. Any one or more of these will trigger the Suspicious Activity Related to Security-Enabled Group alert types. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Activity Related to Security-Enabled Group Alert Type | write_time | 
| windows_security_suspicious_connection_process | Suspicious Connection to Another Process More details   Suspicious Connection to Another ProcessThe Suspicious Connection to Another Process rules are used to identify suspicious connection to another process. Any one or more of these will trigger the Suspicious Connection to Another Process alert types. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Connection to Another Process Alert Type | write_time | 
| windows_security_suspicious_handle_request | Suspicious Handle Request to Sensitive Object More details   Suspicious Handle Request to Sensitive ObjectThe Suspicious Handle Request to Sensitive Object rules are used to identify suspicious activity with handle requests to sensitive Windows objects. Any one or more of these will trigger the Suspicious Handle Request to Sensitive Object alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Handle Request to Sensitive Object Alert Type | write_time | 
| windows_security_suspicious_logon_event | Suspicious Windows Logon Event More details   Suspicious Windows Logon EventThe Suspicious Windows Logon Event rules are used to identify suspicious activity with Windows logons. Any one or more of these will trigger the Suspicious Windows Logon alert types. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Windows Logon Event Alert Type | write_time | 
| windows_security_suspicious_service_installation | Suspicious Windows Service Installation More details   Suspicious Windows Service InstallationThe Suspicious Windows Service Installation rules are used to identify suspicious activity with service installation. Any one or more of these will trigger the Suspicious Windows Service Installation alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Suspicious Windows Service Installation Alert Type | write_time | 
| windows_suspicious_process_creation | Suspicious Windows Process Creation More details   Suspicious Windows Process CreationThe Suspicious Windows Process Creation rules are used to identify suspicious activity associated with process creation. Any one or more of these will trigger the Suspicious Process Creation alert type. XDR Kill ChainEvent NameThe  Alert Suppression FieldsAlert suppression fields are attribute values that trigger deduplication of alerts sharing them. 
 Key Fields and Relevant Data PointsKey fields are meaningful and human-readable data points representing observable(s) being detected. 
 Link to Rule-Based Alert TypesRules Contributing to Windows Suspicious Process Creation Alert Type | write_time | 






 and consider blocking.
 and consider blocking.
