Cisco SE - Ransomware Activity

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This rule is triggered when possible ransomware activity is detected on host.

Attribute Value
Type Analytic Rule
Solution Cisco Secure Endpoint
ID c9629114-0f49-4b50-9f1b-345287b2eebf
Severity High
Status Available
Kind Scheduled
Tactics Impact
Techniques T1486
Required Connectors CiscoSecureEndpoint
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CiscoSecureEndpointAuditLogsV2_CL ? ?
CiscoSecureEndpointEventsV2_CL ? ?
CiscoSecureEndpoint_CL 🔶 ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Cisco Secure Endpoint