Infoblox - Many High Threat Level Queries From Single Host Detected

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


At least 200 high threat level queries generated by single host in 1 hour. Queries do not need to be the same. Customize query count, scheduling, responses and more. This rule depends on a parser based on a Kusto Function to work as expected called InfobloxCDC.

Attribute Value
Type Analytic Rule
Solution Infoblox Cloud Data Connector
ID 3822b794-fa89-4420-aad6-0e1a2307f419
Severity Medium
Status Available
Kind Scheduled
Tactics Impact
Techniques T1498, T1565
Required Connectors CefAma
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
CommonSecurityLog DeviceEventClassID has "RPZ"
DeviceProduct == "Data Connector"
DeviceVendor == "Infoblox"
?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Infoblox Cloud Data Connector