Phishing link click observed in Network Traffic

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


The purpose of this content is to identify successful phishing links accessed by users. Once a user clicks on a phishing link, we observe successful network activity originating from non-Microsoft network devices. These devices may include Palo Alto Networks, Fortinet, Check Point, and Zscaler devices.

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID 2fed0668-6d43-4c78-87e6-510f96f12145
Severity Medium
Kind Scheduled
Tactics InitialAccess
Techniques T1566
Required Connectors OfficeATP, PaloAltoNetworks, Fortinet, CheckPoint, Zscaler
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
CommonSecurityLog DeviceProduct startswith "FireWall"
DeviceProduct startswith "FortiGate"
DeviceProduct startswith "NSSWeblog"
DeviceProduct startswith "PAN"
DeviceProduct startswith "URL"
DeviceProduct startswith "VPN"
DeviceVendor has_any "Check Point,Fortinet,Palo Alto Networks,Zscaler"
?
SecurityAlert ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
AzureActiveDirectoryIdentityProtection Microsoft Entra ID Protection
AzureAdvancedThreatProtection Microsoft Defender for Identity
AzureSecurityCenter Microsoft Defender for Cloud
CefAma Common Event Format
CloudNSSAuditLogs_ccp Zscaler Internet Access
CloudNSSCASBActivityLogs_ccp Zscaler Internet Access
CloudNSSCASBCRMLogs_ccp Zscaler Internet Access
CloudNSSCASBCloudStorageLogs_ccp Zscaler Internet Access
CloudNSSCASBCollabLogs_ccp Zscaler Internet Access
CloudNSSCASBEmailLogs_ccp Zscaler Internet Access
CloudNSSCASBFileSharingLogs_ccp Zscaler Internet Access
CloudNSSCASBITSMLogs_ccp Zscaler Internet Access
CloudNSSCASBRepoLogs_ccp Zscaler Internet Access
CloudNSSDNSLogs_ccp Zscaler Internet Access
CloudNSSEmailDLPLogs_ccp Zscaler Internet Access
CloudNSSEndpointDLPLogs_ccp Zscaler Internet Access
CloudNSSFWLogs_ccp Zscaler Internet Access
CloudNSSTunnelLogs_ccp Zscaler Internet Access
CloudNSSWebLogs_ccp Zscaler Internet Access
IoT IoTOTThreatMonitoringwithDefenderforIoT
MicrosoftCloudAppSecurity Microsoft Defender for Cloud Apps
MicrosoftDefenderAdvancedThreatProtection MicrosoftDefenderForEndpoint
MicrosoftDefenderForCloudTenantBased Microsoft Defender for Cloud
OfficeATP Microsoft Defender for Office 365
OfficeIRM MicrosoftPurviewInsiderRiskManagement
VirtualMetricDirectorProxy VirtualMetric DataStream
VirtualMetricMSSentinelConnector VirtualMetric DataStream
VirtualMetricMSSentinelDataLakeConnector VirtualMetric DataStream

Solutions: Common Event Format, IoTOTThreatMonitoringwithDefenderforIoT, Microsoft Defender for Cloud, Microsoft Defender for Cloud Apps, Microsoft Defender for Identity, Microsoft Defender for Office 365, Microsoft Entra ID Protection, MicrosoftDefenderForEndpoint, MicrosoftPurviewInsiderRiskManagement, VirtualMetric DataStream, Zscaler Internet Access


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules