Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Detects when logging errors on agent.
| Attribute | Value |
|---|---|
| Type | Analytic Rule |
| Solution | McAfee ePolicy Orchestrator |
| ID | 0c9243d6-d2ec-48e1-8593-e713859c8f3c |
| Severity | Medium |
| Status | Available |
| Kind | Scheduled |
| Tactics | DefenseEvasion |
| Techniques | T1562, T1070 |
| Required Connectors | SyslogAma |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Selection Criteria | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|---|
Syslog |
ProcessName contains "EPOEvents"SyslogMessage contains "<EPOevent>"SyslogMessage contains "<UpdateEvents>" |
✓ | ✓ | ? |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Analytic Rules · Back to McAfee ePolicy Orchestrator