Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This query helps identify rare DNS connections and resulting data transfer to/from the associated domain. It can help identify unexpected large data transfers to or from internal systems which may indicate data exfil or malicious tool download.
| Attribute | Value |
|---|---|
| Type | Hunting Query |
| Solution | Standalone Content |
| ID | 06c52a66-fffe-4d3b-a05a-646ff65b7ec2 |
| Tactics | CommandAndControl, Exfiltration |
| Techniques | T1071, T1048 |
| Required Connectors | DNS, PaloAltoNetworks, AzureMonitor(WireData), AzureMonitor(VMInsights) |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Selection Criteria | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|---|
CommonSecurityLog |
DeviceVendor == "Palo Alto Networks" |
✓ | ✓ | ? |
DnsEvents |
✓ | ✗ | ? | |
VMConnection |
? | ✗ | ? |
The following connectors provide data for this content item:
Solutions: Common Event Format, VirtualMetric DataStream, Windows Server DNS, Zscaler Internet Access
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊