Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This content is utilized to identify instances of successful login by risky users, who have been observed engaging in potentially suspicious network activity on non-Microsoft network devices.
| Attribute | Value |
|---|---|
| Type | Analytic Rule |
| Solution | Standalone Content |
| ID | 042f2801-a375-4cfd-bd29-041fc7ed88a0 |
| Severity | Medium |
| Kind | Scheduled |
| Tactics | CommandAndControl |
| Techniques | T1071 |
| Required Connectors | AzureActiveDirectory, PaloAltoNetworks, Fortinet, CheckPoint, Zscaler |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Selection Criteria | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|---|
CommonSecurityLog |
DeviceProduct startswith "FireWall"DeviceProduct startswith "FortiGate"DeviceProduct startswith "NSSWeblog"DeviceProduct startswith "PAN"DeviceProduct startswith "URL"DeviceProduct startswith "VPN"DeviceVendor has_any "Check Point,Fortinet,Palo Alto Networks,Zscaler" |
✓ | ✓ | ? |
SigninLogs |
✓ | ✗ | ? |
The following connectors provide data for this content item:
Solutions: Common Event Format, Microsoft Entra ID, VirtualMetric DataStream, Zscaler Internet Access
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊