Infoblox - Many High Threat Level Single Query Detected

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Single high threat level domain queried at least 200 times in 1 hour regardless of source. Customize query count, scheduling, responses and more. This rule depends on a parser based on a Kusto Function to work as expected called InfobloxCDC.

Attribute Value
Type Analytic Rule
Solution Infoblox Cloud Data Connector
ID 99278700-79ca-4b0f-b416-bf57ec699e1a
Severity Medium
Status Available
Kind Scheduled
Tactics Impact
Techniques T1498, T1565
Required Connectors CefAma
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
CommonSecurityLog DeviceEventClassID has "RPZ"
DeviceProduct == "Data Connector"
DeviceVendor == "Infoblox"
?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Infoblox Cloud Data Connector