open-menu
closeme
Attempt to Deactivate an Okta Network Zone
calendar
Sep 25, 2024
·
Use Case: Identity and Access Audit
Data Source: Okta
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
Attempt to Delete an Okta Network Zone
calendar
Sep 25, 2024
·
Use Case: Identity and Access Audit
Data Source: Okta
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
Attempt to Modify an Okta Network Zone
calendar
Sep 25, 2024
·
Use Case: Identity and Access Audit
Data Source: Okta
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
Potential Network Scan Detected
calendar
Sep 19, 2024
·
Domain: Network
Tactic: Discovery
Tactic: Reconnaissance
Use Case: Network Security Monitoring
Data Source: Elastic Defend
Data Source: PAN-OS
·
Share on:
twitter
facebook
linkedin
copy
Potential Network Sweep Detected
calendar
Sep 19, 2024
·
Domain: Network
Tactic: Discovery
Tactic: Reconnaissance
Use Case: Network Security Monitoring
Data Source: Elastic Defend
Data Source: PAN-OS
·
Share on:
twitter
facebook
linkedin
copy
Potential SYN-Based Network Scan Detected
calendar
Sep 19, 2024
·
Domain: Network
Tactic: Discovery
Tactic: Reconnaissance
Use Case: Network Security Monitoring
Data Source: Elastic Defend
Data Source: PAN-OS
·
Share on:
twitter
facebook
linkedin
copy
AWS EC2 Full Network Packet Capture Detected
calendar
May 22, 2024
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Use Case: Network Security Monitoring
Tactic: Exfiltration
Tactic: Collection
·
Share on:
twitter
facebook
linkedin
copy
AWS EC2 Network Access Control List Creation
calendar
May 22, 2024
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Data Source: AWS EC2
Use Case: Network Security Monitoring
Tactic: Persistence
·
Share on:
twitter
facebook
linkedin
copy
AWS EC2 Network Access Control List Deletion
calendar
May 22, 2024
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
AWS Route Table Created
calendar
May 22, 2024
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Data Source: AWS Route53
Use Case: Network Security Monitoring
Tactic: Persistence
·
Share on:
twitter
facebook
linkedin
copy
AWS Route Table Modified or Deleted
calendar
May 22, 2024
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Data Source: AWS Route53
Use Case: Network Security Monitoring
Tactic: Persistence
·
Share on:
twitter
facebook
linkedin
copy
AWS Security Group Configuration Change Detection
calendar
May 22, 2024
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Data Source: AWS EC2
Use Case: Network Security Monitoring
Tactic: Persistence
·
Share on:
twitter
facebook
linkedin
copy
AWS WAF Access Control List Deletion
calendar
May 22, 2024
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
AWS WAF Rule or Rule Group Deletion
calendar
May 22, 2024
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
Azure Firewall Policy Deletion
calendar
May 22, 2024
·
Domain: Cloud
Data Source: Azure
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
Azure Frontdoor Web Application Firewall (WAF) Policy Deleted
calendar
May 22, 2024
·
Domain: Cloud
Data Source: Azure
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
Azure Network Watcher Deletion
calendar
May 22, 2024
·
Domain: Cloud
Data Source: Azure
Use Case: Network Security Monitoring
Tactic: Defense Evasion
·
Share on:
twitter
facebook
linkedin
copy
Azure Virtual Network Device Modified or Deleted
calendar
May 22, 2024
·
Domain: Cloud
Data Source: Azure
Use Case: Network Security Monitoring
Tactic: Impact
·
Share on:
twitter
facebook
linkedin
copy
to-top