Document toolboxDocument toolbox

Release 16 - Out-of-the-box alerts

Detection name

Detection description

Devo table / Data source / Category

Update 

SecOpsAWSCreatePolicyVersionToAllowAllResources

This search looks for AWS CloudTrail events where a user has created a policy version that allows the user to access any resource in their account.

cloud.aws.cloudtrail

New Alert

SecOpsAPT29byGoogleUpdateServiceInstall

Monitor service creation through changes in the Registry and common utilities using command-line invocation ir order to detect Russian nation-state attackers APT29.

box.all.win

Alert Logic Updated

SecOpsAccountsCreatedRemovedWithinFourHours

Detects user accounts that are created and delete within a four time period.

box.all.win

Alert Logic Updated 

SecOpsResetPasswordAttempt

The process of resetting a password can be related to an attack in combination with other indicators.

 

box.all.win

Alert Logic Updated

SecOpsO365AuthExcessiveFailedLoginsUserAuthAll

Detects when a user account has multiple failed Office 365 authentication attempts.

auth.all

New Alert 

SecOpsLoginFailCombinedSuccessed

It could be considered an indicator of compromise when after a raised number of failed access attempts there is a valid access.

auth.all

Alert Logic updated 

SecOpsImpossibleTravelO365

This policy triggers when activities are detected from the same user in different locations within a time period that is shorter than the expected travel time between the two locations. This could indicate that a different user is using the same credentials.

Cloud.office365.siem_agent

Alert Logic updated

SecOpsSlackMassDownloadEvents

Detects users downloading many files in a short amount of time via Slack.

app.slack.audit

New Alert

SecOpsAnonymousConnection

Control over the navigation of the users and systems of the networks is considered essential to avoid risks. Access to anonymous navigation networks must be monitored.

firewall.all.traffic

Alert Logic Updated

SecOpsAWSCreatePolicyVersionToAllowAllResources

This search looks for AWS CloudTrail events where a user has created a policy version that allows the user to access any resource in their account.

cloud.aws.cloudtrail

New Alert

SecOpsWinUserAddedPrivlegedSecGroup

UnPrivileged account added to Global Security Group

box.all.win

Updated Alert LogicÂ