| Vaikora - Agent policy violation |
Medium |
📦 Vaikora-Sentinel |
| Vaikora - Behavioral anomaly detected |
Medium |
📦 Vaikora-Sentinel |
| Vaikora - High severity AI agent action detected |
High |
📦 Vaikora-Sentinel |
| Valence Security Alerts |
High |
📦 Valence Security |
| Valimail Enforce - DMARC Policy Weakened to None |
High |
📦 ValimailEnforce |
| Valimail Enforce - Email Authentication Key Deleted |
Medium |
📦 ValimailEnforce |
| Valimail Enforce - High-Value User Management Event |
High |
📦 ValimailEnforce |
| Valimail Enforce - Unusual Rate of Configuration Changes or User Additions |
Medium |
📦 ValimailEnforce |
| vArmour AppController - SMB Realm Traversal |
Medium |
📦 vArmour Application Controller |
| Vaults Alerts for Prancer ⚠️ |
High |
📦 Prancer PenSuiteAI Integration |
| vCenter - Root impersonation |
Medium |
📦 VMware vCenter |
| Vectra Account's Behaviors |
Informational |
📦 Vectra AI Detect |
| Vectra AI Detect - Detections with High Severity |
High |
📦 Vectra AI Detect |
| Vectra AI Detect - New Campaign Detected |
Medium |
📦 Vectra AI Detect |
| Vectra AI Detect - Suspected Compromised Account |
Informational |
📦 Vectra AI Detect |
| Vectra AI Detect - Suspected Compromised Host |
Informational |
📦 Vectra AI Detect |
| Vectra AI Detect - Suspicious Behaviors by Category |
Informational |
📦 Vectra AI Detect |
| Vectra Create Detection Alert for Accounts |
Medium |
📦 Vectra XDR |
| Vectra Create Detection Alert for Hosts |
Medium |
📦 Vectra XDR |
| Vectra Create Incident Based on Priority for Accounts |
Medium |
📦 Vectra XDR |
| Vectra Create Incident Based on Priority for Hosts |
Medium |
📦 Vectra XDR |
| Vectra Create Incident Based on Tag for Accounts |
High |
📦 Vectra XDR |
| Vectra Create Incident Based on Tag for Hosts |
High |
📦 Vectra XDR |
| Vectra Host's Behaviors |
Informational |
📦 Vectra AI Detect |
| Veeam ONE Application with No Recent Data Backup Sessions |
High |
📦 Veeam |
| Veeam ONE Backup Copy RPO |
High |
📦 Veeam |
| Veeam ONE Backup Server Security and Compliance State |
Medium |
📦 Veeam |
| Veeam ONE Computer with No Backup |
High |
📦 Veeam |
| Veeam ONE Immutability Change Tracking |
Medium |
📦 Veeam |
| Veeam ONE Immutability State |
Medium |
📦 Veeam |
| Veeam ONE Job Disabled |
Medium |
📦 Veeam |
| Veeam ONE Job Disabled (Veeam Backup for Microsoft 365) |
Medium |
📦 Veeam |
| Veeam ONE Malware Detection Change Tracking |
High |
📦 Veeam |
| Veeam ONE Possible Ransomware Activity (Hyper-V) |
High |
📦 Veeam |
| Veeam ONE Possible Ransomware Activity (vSphere) |
High |
📦 Veeam |
| Veeam ONE Suspicious Incremental Backup Size |
High |
📦 Veeam |
| Veeam ONE Unusual Job Duration |
Medium |
📦 Veeam |
| Veeam ONE Unusual Job Duration (Veeam Backup for Microsoft 365) |
Medium |
📦 Veeam |
| Veeam ONE VM with No Backup |
High |
📦 Veeam |
| Veeam ONE VM with No Backup (Hyper-V) |
High |
📦 Veeam |
| Veeam ONE VM with No Replica |
High |
📦 Veeam |
| Veeam ONE VM with No Replica (Hyper-V) |
High |
📦 Veeam |
| Versasec CMS - Multiple Failed Login Attempts |
High |
📦 VersasecCMS |
| VIP Mailbox manipulation |
Medium |
📦 Microsoft Exchange Security - Exchange On-Premises |
| Virtual Lab Deleted |
Low |
📦 Veeam |
| Virtual Lab Settings Updated |
Low |
📦 Veeam |
| Virtual Machines Alerts for Prancer ⚠️ |
High |
📦 Prancer PenSuiteAI Integration |
| VirtualNetworkPeerings Alerts From Prancer ⚠️ |
High |
📦 Prancer PenSuiteAI Integration |
| VMware Cloud Web Security - Data Loss Prevention Violation |
Medium |
📦 VMware SASE |
| VMware Cloud Web Security - Policy Change Detected |
Informational |
📦 VMware SASE |
| VMware Cloud Web Security - Policy Publish Event |
Informational |
📦 VMware SASE |
| VMware Cloud Web Security - Web Access Policy Violation |
Medium |
📦 VMware SASE |
| VMware Edge Cloud Orchestrator - New LAN-Side Client Device Detected |
Informational |
📦 VMware SASE |
| VMware ESXi - Dormant VM started |
Medium |
📦 VMWareESXi |
| VMware ESXi - Low patch disk space |
Medium |
📦 VMWareESXi |
| VMware ESXi - Low temp directory space |
Medium |
📦 VMWareESXi |
| VMware ESXi - Multiple Failed Shell Login via SSH |
Medium |
📦 VMWareESXi |
| VMware ESXi - Multiple new VMs started |
Medium |
📦 VMWareESXi |
| VMware ESXi - Multiple VMs stopped |
Medium |
📦 VMWareESXi |
| VMware ESXi - New VM started |
Medium |
📦 VMWareESXi |
| VMware ESXi - Root impersonation |
Medium |
📦 VMWareESXi |
| VMware ESXi - Root login |
High |
📦 VMWareESXi |
| VMware ESXi - Root password changed |
High |
📦 VMWareESXi |
| VMware ESXi - Shared or stolen root account |
High |
📦 VMWareESXi |
| VMware ESXi - SSH Enable on ESXi Host |
High |
📦 VMWareESXi |
| VMware ESXi - Unexpected disk image |
Medium |
📦 VMWareESXi |
| VMware ESXi - VM stopped |
Medium |
📦 VMWareESXi |
| VMware SD-WAN - Orchestrator Audit Event |
Informational |
📦 VMware SASE |
| VMware SD-WAN Edge - All Cloud Security Service Tunnels DOWN |
Medium |
📦 VMware SASE |
| VMware SD-WAN Edge - Device Congestion Alert - Packet Drops |
Medium |
📦 VMware SASE |
| VMware SD-WAN Edge - IDS/IPS Alert triggered (Search API) |
High |
📦 VMware SASE |
| VMware SD-WAN Edge - IDS/IPS Alert triggered (Syslog) |
High |
📦 VMware SASE |
| VMware SD-WAN Edge - IDS/IPS Signature Update Failed |
High |
📦 VMware SASE |
| VMware SD-WAN Edge - IDS/IPS Signature Update Succeeded |
Informational |
📦 VMware SASE |
| VMware SD-WAN Edge - Network Anomaly Detection - Potential Fragmentation Attack |
Low |
📦 VMware SASE |
| VMware SD-WAN Edge - Network Anomaly Detection - RPF Check Failure |
Low |
📦 VMware SASE |
| VMware vCenter - Root login |
High |
📦 VMware vCenter |
| Votiro - File Blocked from Connector |
Low |
📦 Votiro |
| Votiro - File Blocked in Email |
Low |
📦 Votiro |
| VTI - High Severity Domain Collision Detection |
High |
📦 Visa Threat Intelligence (VTI) |
| VTI - High Severity SHA1 Collision Detection |
High |
📦 Visa Threat Intelligence (VTI) |
| Vulerabilities |
High |
📦 RidgeSecurity |
| Vulnerable Machines related to log4j CVE-2021-44228 |
High |
📦 Apache Log4j Vulnerability Detection |
| Vulnerable Machines related to OMIGOD CVE-2021-38647 |
High |
📄 Standalone Content |