Esm GDPR Solutionguide
Esm GDPR Solutionguide
Solutions Guide
Legal Notices
Open Text Corporation
275 Frank Tompa Drive, Waterloo, Ontario, Canada, N2L 0A1
Copyright Notice
Copyright 2021 Open Text.
The only warranties for products and services of Open Text and its affiliates and licensors (“Open Text”) are as may be
set forth in the express warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. Open Text shall not be liable for technical or editorial errors or
omissions contained herein. The information contained herein is subject to change without notice.
Trademark Notices
“OpenText” and other Open Text trademarks and service marks are the property of Open Text or its affiliates. All other
trademarks or service marks are the property of their respective owners.
Support
Contact Information
Phone A list of phone numbers is available on the Technical Support
Page: https://softwaresupport.softwaregrp.com/support-contact-information
Contents
Chapter 1: Compliance Insight Package for GDPR Overview and Architecture 4
CIP for GDPR 4
Solution Architecture 4
GDPR Rules Overview 7
Risk Score Overview Dashboard 8
Solution for GDPR CIP Device Coverage 10
Chapter 2: Solution Installation and Configuration 11
Prepare for Installation 11
Prepare Environment 11
Verify Environment 11
Install Solution for GDPR CIP 12
Assign User Permissions 13
Configure CIP for GDPR Solution 14
Model Assets (Assign Asset Categories) 15
CIP for GDPR Categorization 15
Categorizing Assets and Zones 16
Configure Active Lists 17
Active Lists that Require Configuration 19
Configure Active Lists Using Console Active List Editor 21
Configure Active Lists by Importing a CSV File 22
Configure My Filters 22
After Hours Filter 23
Limit Regulation Filter 23
Deploy the CIP for GDPR Rules 24
Enable Data Monitors 24
Configure Additional Resources 24
Build FlexConnector(s) for Physical Access Devices 25
Chapter 3: CIP for GDPR Use Cases 27
General Use Cases 28
Appendix A: GDPR Resource Reference 46
Appendix B: GDPR Categories 88
Solution Architecture
CIP for GDPR helps ensure compliance with GDPR requirements by providing a set of use cases
that address and support the GDPR security controls as listed in Chapter 3‚ CIP for GDPR Use
Cases‚
Chapter 1: Compliance Insight Package for GDPR Overview and Architecture Page 4 of 91
Solutions Guide
Resources are organized into use cases by security purpose or area such as Audit Log Cleared
or Personal identifiable information monitoring. These use cases are represented in ArcSight
ESM as use case resources and provide a central location for managing content. The CIP for
GDPR use cases are listed in the Use Case tab of the Navigator panel as shown in the following
figure
For example, the following figure shows the resources that make up the Data Flow between
GDPR Systems and non EU Countries use case resource.
For instructions on viewing the resources associated with a use case, see “View Use Case
Resources” on chapter 2.
In addition to the resources supplied to help address specific GDPR Article there are a common
set of filters and active lists that support the entire solution. These common resources are
described in "Solution Installation and Configuration" , These resources require configuration
to tailor the content for your environment, such as privileged account names or the DMZ
Assets in your organization.
The dashboard is populated when a possible violation or an actual violation occurs. A yellow or
red data
monitor can be turned to green manually when the situation is remedied by right-clicking the
data
monitor and selecting Override Status
The colors of the traffic lights indicate the current state as described in the following table:
Red Violation This situation occurs when one or more rules are triggered by event activity that violates
compliance for this GDPR ARTICLE section
Yellow Possible This situation occurs when one or more marginal events occur that could indicate a
Violation
policy problem, or is a borderline compliance violation
Green Compliant Systems are considered compliant when any events related to this GDPR
Remain under the threshold of Yellow.
Before running the Compliance Risk Score Overview dashboard make sure of the following:
l Data monitor Compliance Risk Score Overview which available also from GDPR/Overview
should be enabled refer to chapter 2 “Enabling data monitors”.
l Rule Compliance Score Update which available also from GDPR/Overview should be
enabled. Refer to chapter 2 “Enabling GPDR Rules."
l Rule Manual Status Change which available also from GDPR/Overview should be enabled.
Refer to chapter 2 “Enabling GPDR Rules."
Prepare Environment
Before installing, prepare your environment for the CIP for GDPR:
1. Install and configure the appropriate SmartConnectors for the devices found in your
environment.
2. Model your network to include devices that supply events that help satisfy the GDPR
Requirements. Verify that zones and networks are defined for your environment and that
networks are assigned to the connectors reporting GDPR-relevant events into your
ArcSight Manager. Learn more about the ArcSight network modeling process in ArcSight
ESM 101. Find instructions for how to configure zones and networks in the ArcSight
Console User's Guide or the ArcSight Console User's Guide online help.
Verify Environment
Before installing, verify your ArcSight ESM installation. Compliance Insight Package for GDPR is
supported on ArcSight ESM. Refer to the ESM technical requirements for operating system
requirements. Refer also to the applicable release notes for the version in question.
Verify that your system has the supported ArcSight Console connected to the Manager.
Note: CIP for GDPR is a self-contained solution that does not rely on any other ArcSight solution.
You can install CIP for GDPR alongside other solutions on the same ArcSight Manager. Before
installing new solutions, Micro Focus recommends that you back up any existing solutions
installed on the Manager.
Caution: If you use Internet Explorer to download the ARB file, it may convert the ARB file to a
ZIP file. If this occurs, rename the ZIP file back to an ARB file before importing.
6. Leave the GDPR checkbox selected and in the Packages for Installation dialog, click Next.
The progress of the install is displayed in the Progress tab of the Installing Packages dialog.
When the install is complete, the Results tab of the Installing Packages dialog displays the
Summary Report.
7. In the Installing Packages dialog, click OK.
8. In the Importing Packages dialog, click OK.
9. To verify that the installation was successful and the content is accessible in the Navigator
panel, expand the ArcSight Solutions/GDPR group.
The following process assumes that you have user groups set up and users assigned to them.
In the following procedure, assign user permissions to all the following resource types:
l Active channels
l Active lists
l Dashboards
l Data monitors
l Field Sets
l Filters
l Queries
l Rules
l Add entries to active lists, one-by-one, using the Active List editor in the ArcSight Console.
For detailed instructions, see "Configure Active Lists Using Console Active List Editor" on
page 21. This method can be used to populate active lists with one, two, or more columns.
l Add entries in batch to active list from a comma separated value (CSV) file. For detailed
instructions see "Configure Active Lists by Importing a CSV File" on page 22. This method
can be used to populate active lists with one, two, or more columns.
Active Lists Requiring Configuration defines the active lists that require configuration for the
CIP for GDPR. Some active lists are intended to be populated by rules. Also, there are Active
Lists requiring manual Configuration for the CIP GDPR. For a complete listing (with
descriptions) of all active lists provided with CIP for GDPR that require configuration, see the
table below.
Expected Input
Active List Description Per Entry
Administrative This active list should be populated with the User name, in
lowercase.
Accounts usernames that have administrative privileges in your
domain. Admins (those responsible for managing
administrative users) populate this list manually
whenever a new administrative user is added. Entries
to this list are read by reports supplied in the content
pack, but the list can also be added to or referenced in
new content built around the provided infrastructure.
This active list should be populated with the
usernames that have administrative privileges in your
domain. Entries in this list should be in all lower case.
For example, the user Administrator should be added
as "administrator".
Badges to This list contains the computer account and employee type for every physical Badge ID,
device badge.
Accounts primary
computer
account for
Populate this active list with the badge ID, primary computer account for the
badgeholder (in case its a visitor use the vistor user name), and the employee the
type for users in your organization (in lowercase). Specifically, ensure that badgeholder
contractors and visitors are identified with the word “Contractor” (case (in case its a
insensitive) in the employee type field. visitor use the
vistor user
name),
the employee
type
(in lowercase).
Specifically,
ensure that
Contractors
and vistors are
identified with
the word
“Contractor”
“Vistor” (case
insensitive) in
the
employee type
field.
Expected Input
Active List Description Per Entry
DMZ Assets This List should contains DMZ assets on the organization like DNS,WEB,SMTP IP Address of
servers. authorized
DNS,WEB,
SMTP servers
it contains 2 fields : IPAddres and AssetType where the IPAddress is the IP on your
Address of the asset and the AssetType is the type of the asset on lower case organization,
(by default supported 3 types dns,web,smtp).
Asset Type one
of the
following dns
for example if your web server ip is x.y.z.w you should add it as
,web smtp on
IPAddress=x.y.z.w ,AssetType=web lower case.
Important This list stores important emails of high-profile targets on the organization like Email and
Emails C-lever executives which could be targeted by spear phishing attacks. UserName , in
lowercase
entries in this list should be in all lower case.
Insecure Ports This active list includes ports related to unencrypted Port Number
and thus insecure communication services.
Insecure This active list includes the names of processes that Process name,
Processes in lowercase
provide unencrypted and thus insecure communications.
Name Value
Creation This field is reserved for active lists that are populated dynamically by rule actions. Leave
Time this field blank.
Last Seen This field is reserved for active lists that are populated dynamically by rule actions. Leave
Time this field blank.
Count This field is reserved for active lists that are populated dynamically by rule actions. Leave
this field unchanged.
Tip: By default, the active list displays 2000 entries at a time. To view entries outside the
range shown, create an active list filter that specifies a different range (click Filter in the
active list header).
Configure My Filters
Configure the following common filters stored in the My Filters group to reflect your
organization:
l "After Hours Filter" on the next page
l "Limit Regulation Filter" on the next page
Tip: The DayOfWeek variable returns an integer value that is displayed on the ArcSight Console as
a string value of the current day: Saturday, Sunday, Monday, Tuesday, Wednesday, Thursday, or
Friday . Since the DayOfWeek variable is an integer, you can specify a range of days such as
(DayOfWeek >= Monday AND DayOfWeek <= Friday).
The HourOfDay variable returns a numerical value for the current hour in 24-hour format ranging
from 12 AM = 0 to 11 PM = 23.
For example, to redefine the after business hours from 6:00 PM to 8:00 AM on all weekdays and
all of Saturday and Sunday use the filter show in the following figure.
To enable a rule:
1. In the Navigator panel, go to Rules and navigate to the Real-time Rules/GDPR group.
2. Navigate to the rule you want to enable.
3. Right-click the rule and select Enable Rule. To select multiple rules, press the Ctrl key and
click each rule. To select a range of rules, press the Ctrl and Shift keys and click the first and
last rule in the range.
For more information about working with rules, see the Rules Authoring topic in the ArcSight
Console User's Guide.
Use the following event categories for the following event types:
Event Categories
Device
Event type Object Behavior Technique Group Outcome Significance
Account Lockouts This use case monitor account Operating Systems Edit the Account Lockouts filter
lockout events. to
Relevant to the following GDPR add conditions for lockout
Articles 24,25,28,32 and Recital 49. events
from other devices in your
environment. By default, the
Account
Lockouts filter identifies account
lockouts on Microsoft Windows
and
UNIX systems. Verify that the
Account Lockouts filter detects
events in your environment that
match the expected behaviour.
Assets not This use case provide resources to Vulnerability When a vulnerability scan event
Scanned for monitor assets not scanned for Assessments is
Longer than Policy Longer than organization Policy detected on specific asset the
Standard Standard . organization policy scan
standard time limit is defined by the are placed on the "Vulnerability
TTL in the active list of this use case Scanned Assets" active list. An
(default 60 days). entry expiring from this active
Relevant to GDPR Articles 32, 35, 83 list indicates that the there was
and Recitals 76, 77, 78, 83 no vulnerability scan for this
asset for longer than allowed by
policy (as indicated by the TTL of
the active list). In that case,
vulnerability scan not conducted
for Longer than Policy Standard
a rule will detect the event.
If a vulnerability scan on specific
asset conducted on time
defined by the policy, a rule will
detect this event and update the
entry on the active list so it will
not expire. This use case
requires the following
configuration for your
environment:
In the" Vulnerability Scanned
Assets" active list, edit the TTL
to
reflect the maximum amount of
time allowed to conduct
vulnerability scan.
Enable the following rules :
1. Vulnerability Scans
2. Asset not Scanned for Longer
than Policy Standard
for Longer than Policy Standard
Audit Log Cleared This use case provides information Operating Systems By default, the Audit Log
about events that occur when an Cleared
audit log is cleared or modified filter returns events indicating
manually. that
audit logs have been cleared on
Relevant to the following GDPR Microsoft Windows or detected
Articles 5, 25 and Recital 49. by
Symantec HostID systems. Edit
this
filter to add conditions for
additional
events known to indicate audit
log
clearing in your environment
Audit Log Failures This use case provides resources to Operating Systems
monitor audit log failure.
Botnet Activity This use case provides information Proxy 1. Make Sure the active list :
about possible botnet activity on the “DMZ
organization. Assets” is configured
2. Make sure the following rule
“Possible Botnet Activity” is
enabled
Relevant to GDPR Article 30, 32 and and deployed before using other
Recital 49. resources for this use case.
CRM and ERP This use case provides resources for Vulnerability Assessments
Flaws monitoring flaws and vulnerabilities
on customer relation management
and enterprise resource planning
products.
Relevant to GDPR Articles 32, 35, 83
and Recitals 76, 77, 78, 83.
Clear Text This use case provides resources to monitor password transmitted on clear text.
Password
Transmission
Critical This use case includes resources to Operating System Database assets should be
Configuration monitor critical configuration Database categorized with this category
Changes changes. "/All Asset Categories/Site Asset
Categories/Business Impact
Relevant to the following GDPR Analysis/Business
Articles 32. Role/Service/Database".
Database Flaws This use case provides resources for Vulnerability Assessments
monitoring different database flaws
and vulnerabilities.
Email Activity This use case provides resources for Email Servers Before deploying "Potential
monitoring email attacks. (Microsoft Spear Phishing Attack" rule
Exchange) please make sure to add high
Relevant to GDPR Article 32 Recital Intrusion Detection profile email addresses to the
49. Systems “Important Emails” active list.
Intrusion Prevention
Systems This list stores
important emails of high-profile
targets on the organization like
C- level executives which could
be
targeted by spear phishing
attacks.
Entries in this list should be in all
lower case.
Exploit Executed This use case contains resources for Intrusion Detection Database assets should be
on Databases monitoring exploits executed against Systems categorized with this category
databases. Intrusion Prevention "/All Asset Categories/Site Asset
Systems Categories/Business Impact
Relevant to GDPR Article 32 and Anti-Virus Analysis/Business
Recital 49. Content Security Role/Service/Database".
Exploit Executed This use case contains resources for Intrusion Detection PII assets should be categorized
on PII Assets monitoring exploits executed against Systems with the /All Assets
PII Assets. Intrusion Prevention Categories/Compliance Insight
Systems Package/Network
Relevant to GDPR Article 32 and Anti-Virus Domains/Electronic PII.
Recital 49. Content Security
Frequent This use case contains resources for Operating Systems PII assets should be categorized
Unsuccessful monitoring frequent unsuccessful with the /All Assets
Logins from non user login from non EU countries to Categories/Compliance Insight
EU Countries to PII PII Asset. Package/Network
Asset Domains/Electronic PII.
Relevant to the following GDPR
Articles 24,25,28,32 and Recital 49.
High Risk Events This use case includes resources for Intrusion Detection
monitoring high risk events. Systems
Intrusion
Relevant to GDPR Articles 32, 83 and PreventionSystems
Recital 49. Databases
Operating Systems
Firewalls
Virtual Private
Networks (VPN)
Vulnerability
Assessments
Identity
Management
Policy Management
Network Equipment
Content Security
Web Filtering
Anti-Virus
Physical Security
Systems
Wireless
Applications
Network Based
Anomaly Detection
High Risk This use case provides resources for Vulnerability Assessments
Vulnerabilities monitoring high risk vulnerabilities
on the organization.
Internal Insecure This use case provides information Firewall 1. In the Insecure Processes
Communications about unencrypted and thus Proxy active list,
insecure communications inside the Intrusion add any processes that your
network. Detection Systems organization knows to be
Intrusion insecure.
Relevant to the following GDPR Prevention 2. In the Insecure Ports active
Article 32 and Recital 49. Systems lists,
add the ports that your
organization
knows to be insecure.
3. Verify that the Inbound
Events,
Outbound Events, Insecure
Services
filters detects events in your
environment that match the
expected behavior.
4.Internal Assets should be
categorized as with the /All
Assets Categories/Compliance
Insight Package/Address
Spaces/Protected.
Invalid or Expired This use case contains resources for Intrusion Detection
Certificate monitoring invalid or expired System
certificates. Intrusion Prevention
System
Relevant to GDPR Article 32 and Vulnerability
Recital 49. Assessments
MITRE ATT&CK This use case provides different Security Information PII assets should be categorized
Activity on PII resources for monitoring MITRE Managers with the /All Assets
Assets ATT&CK activity on PII assets. Operating System Categories/Compliance Insight
Intrusion Detection Package/Network
Relevant to GDPR Article 32 and System Domains/Electronic PII.
Recital 49. Intrusion Prevention
Systems
Vulnerability
Assessments
Network
Equipments
Anti-Virus
EDR
Password and This use case provides resources for Vulnerabilit Assessments
Authentication monitoring password and
Weaknesses authentication weaknesses on the
organization.
Password not This use case provide resources to Operating Systems 1. When a successful password
Changed for monitor password not changed for change event is detected, the
Longer than Policy Longer than organization Policy user
Standard Standard . organization policy name for whom the password
standard time limit is defined by the was
TTL in the active list of this use case changed and the device that
(default 90 days). reported the event are placed
on the
Relevant to the following GDPR Password Changes active list. An
Articles 24,25,28,32 and Recital 49. entry expiring from this active
list
indicates that the user has not
changed the password on that
device
for longer than allowed by
policy (as
indicated by the TTL of the
active
list). In that case, Password not
Changed for Longer than Policy
Standard rule will detect the
event.
If the user changes his/her
password within the time
defined by the policy, a rule will
detect this event and update the
entry on the active list so it will
not
expire. The Password
Management
use case requires the following
configuration for your
environment.
a. In the Password Changes
active, edit
the TTL to reflect the maximum
amount of time allowed
between
password changes according to
your
organization’s policy.
b· Edit the Password Change
Attempts
filter to identify all password
change
attempts from devices on your
system. By default, the filter
detects
Physical Access This use case detects violations on Physical Security 1.Before enabling and deploying
events related to physical security Systems this rule “After Hours Building
devices such as badge readers. Access by Contractors” Populate
Specifically, it detects after hour the Badges to Accounts active
building access by contractors. list with the badge ID, primary
computer
Relevant to the following Articles account for the badge holder,
24,32 and Recital 46. and the employee type for users
in your organization (in
lowercase). Specifically, ensure
that contractors are identified
with the words
“Contractor” (case insensitive)
in the employee type field.
Privileged Account This use case monitors changes to Operating Systems In the Administrative Accounts
Changes privileged accounts. active list, define usernames
that
have administrative privileges in
your environment.
SQL Injection This use case provides resources for Vulnerability Assessments
Vulnerabilities monitoring SQL injection
vulnerabilities.
SSL and TLS This use case provides overview Vulnerability Assessments
Vulnerabilities about SSL and TLS vulnerabilities.
Threats from non Thise use case contains resources Intrusion Detection
EU Countries for monitoring threats from non EU Systems
countries. Intrusion Prevention
Systems
Relevant to GDPR Articles 32, 35, 83 Network Based
and Recitals 76, 77, 78, 83. Anomaly Detection
Firewalls
Network Equipment
Content Security
Web Filtering
Antivirus
Wireless
Applications
Security Information
Managers
User Logged In This use case shows login attempts Operating Systems
From Two with the same user name from two
Countries different countries.
User Logged in This use case provides resources for Operating Systems
from different IP monitoring single user names that
Addresses have been used to login from
different IP addresses on short
period of time.
User Logged in This use case shows logins from non Operating Systems PII assets should be categorized
from non EU EU countries to PII assets. with the /All Assets
Countries to PII Categories/Compliance Insight
Asset Relevant to the following GDPR Package/Network
Articles 24,25,28,32 and Recital 49. Domains/Electronic PII.
User Logged in to This use case provides resources for Operating Systems
different Host monitoring single user names that
Names have been used to login to different
host names on short period of time.
Removal of ActiveChannel /All Active Channels/ArcSight Shows a live feed of events reflecting the
Access Rights Solutions/GDPR/GDPR removal of a user's access privileges.
Access Activity/Access
Activity/
Data Flow from ActiveChannel /All Active Channels/ArcSight Shows a live feed of reported events
GDPR Systems to Solutions/GDPR/GDPR reflecting data flow from GDPR Systems to
non EU Countries Regulatory non EU Countries.
Exposure/Composite
Regulatory Exposure/
Data Flow from ActiveChannel /All Active Channels/ArcSight Shows a live feed of reported events
non EU Countries Solutions/GDPR/GDPR reflecting data flow fro non EU Countries to
to GDPR Systems Regulatory GDPR Systems.
Exposure/Composite
Regulatory Exposure/
Personal ActiveChannel /All Active Channels/ArcSight Shows a live feed of events of personal
Information Leak Solutions/GDPR/GDPR information leaks.
Threat Analysis/Internet
Threat Analysis/
Vulnerability ActiveList /All Active Lists/ArcSight This active list stores all the assets that
Scanned Assets Solutions/GDPR/ scanned by vulnerability scanners on the last x
days. The default is 60 days.
Password ActiveList /All Active Lists/ArcSight This active is updated with the user and
Changes Solutions/GDPR/ product information when a successful
password change occurs.
Missing Security ActiveList /All Active Lists/ArcSight This active list stores all the missing security
Patches Solutions/GDPR/ patches reported on the environment. By
default, the active list TTL is set to zero which
means it will hold all of the unfixed security
patches indefinitely.
Insecure ActiveList /All Active Lists/ArcSight This active list includes the names of
Processes Solutions/GDPR/ processes that provide unencrypted and thus
insecure communications.
Insecure Ports ActiveList /All Active Lists/ArcSight This active list includes ports related to
Solutions/GDPR/ unencrypted and thus insecure
communication services.
DMZ Assets ActiveList /All Active Lists/ArcSight This List should contain DMZ assets of the
Solutions/GDPR/ organization like DNS, WEB, SMTP servers.
IPAddress=x.y.z.w, AssetType=web.
Compliance Risk ActiveList /All Active Lists/ArcSight This active list maintains the compliance risk
Score Solutions/GDPR/ score for each regulation section. The
compliance risk score is calculated based on
the triggered rules in the solution package.
You can manually change the score as
required. This change will be reflected in the
Compliance Risk Score dashboard.
Badges to ActiveList /All Active Lists/ArcSight This list contains the computer account and
Accounts Solutions/GDPR/ employee type for every physical device
badge.
Administrative ActiveList /All Active Lists/ArcSight This active list should be populated with the
Accounts Solutions/GDPR/ usernames that have administrative privileges
in your domain. Admins (those responsible
for managing administrative users) populate
this list manually whenever a new
administrative user is added. Entries to this
list are read by reports supplied in the content
pack, but the list can also be added to or
referenced in new content built around the
provided infrastructure.
Important Emails ActiveList /All Active Lists/ArcSight This list stores important emails addresses of
Solutions/GDPR/ high-profile targets on the organization like C-
level executives which could be targeted by
spear phishing attacks.
Physical Access Dashboard /All Dashboards/ArcSight Displays information around physical access.
Activity Solutions/GDPR/GDPR
Access Activity/Access
Activity/
In order for this dashboard component to
allow contractor access after hours to
populate data, please make sure the following
rule : "After Hours Building Access by
Contractors" is enabled and deployed.
Failed Login Dashboard /All Dashboards/ArcSight This dashboard provides overview of failed
Activity Solutions/GDPR/GDPR login activity.
Access Activity/Access
Activity/
Data Flow Dashboard /All Dashboards/ArcSight This dashboard displays data flow between
between GDPR Solutions/GDPR/GDPR GDPR systems and non EU countries.
Systems and non Regulatory
EU Countries Exposure/Composite
Regulatory Exposure/
Data Flow from Dashboard /All Dashboards/ArcSight This dashboard displays data flow from GDPR
GDPR Systems to Solutions/GDPR/GDPR systems and non EU countries.
non EU Countries Regulatory
Exposure/Composite
Regulatory Exposure/
Data Flow from Dashboard /All Dashboards/ArcSight This dashboard displays data flow from non
non EU Countries Solutions/GDPR/GDPR EU countries to GDPR Systems.
to GDPR Systems Regulatory
Exposure/Composite
Regulatory Exposure/
High Risk Events Dashboard /All Dashboards/ArcSight This dashboard provides real-time overview of
Solutions/GDPR/GDPR high risk events reported on the organization.
Regulatory
Exposure/Composite
Regulatory Exposure/
Policy Violations Dashboard /All Dashboards/ArcSight Displays information about policy violations
Solutions/GDPR/GDPR and violators.
Regulatory
Exposure/Composite
Regulatory Exposure/
Worm Activity Dashboard /All Dashboards/ArcSight This dashboard provides overview of worm
Solutions/GDPR/GDPR activity on the organization.
Threat Analysis/Internet
Threat Analysis/
MITRE ATT&CK Dashboard /All Dashboards/ArcSight This dashboard provides overview of MITRE
Overview Solutions/GDPR/GDPR ATT&CK related events reported on the
Threat Analysis/Internet organization.
Threat Analysis/
Attacks and Dashboard /All Dashboards/ArcSight This dashboard provides overview of attacks
Suspicious Solutions/GDPR/GDPR and suspicious related events reported on the
Activity Threat Analysis/Internet organization based on ArcSight
Threat Analysis/ Categorization.
Compliance Risk Dashboard /All Dashboards/ArcSight This dashboard displays information about
Score Overview Solutions/GDPR/Overview/ the compliance risk score for each GDPR
article.
All Rules/ArcSight
Solutions/GDPR/Overview/Compliance Score
Update
All Rules/ArcSight
Solutions/GDPR/Overview/Manual Status
Change
GDPR Rules Dashboard /All Dashboards/ArcSight This dashboard shows high-level information
Overview Solutions/GDPR/Overview/ about GDPR rule firings.
Coordinated DataMonitor /All Data Monitors/ArcSight This data monitor shows coordinated failed
Failed Logins Solutions/GDPR/GDPR logins between attacker IP, attacker countries,
Target IPs - Event Access Activity/Access target IPs as they appear in failed login
Graph Activity/Coordinated Failed events.
Logins/
Coordinated DataMonitor /All Data Monitors/ArcSight This data monitor shows coordinated failed
Failed Logins Solutions/GDPR/GDPR logins between attacker IP, attacker countries,
Target Users - Access Activity/Access target user as they appear in failed login
Event Graph Activity/Coordinated Failed events.
Logins/
GeoView - Failed DataMonitor /All Data Monitors/ArcSight This data monitor shows failed login events
Logins Solutions/GDPR/GDPR on a map.
Access Activity/Access
Activity/Coordinated Failed
Logins/
Last 10 Failed DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 10 failed
Logins Solutions/GDPR/GDPR login events.
Access Activity/Access
Activity/Coordinated Failed
Logins/
Frequent Failed DataMonitor /All Data Monitors/ArcSight Shows a moving average of frequent failed
Login per 10 Solutions/GDPR/GDPR login events. It displays data for the last 10
Minutes Access Activity/Access minutes and will generate a correlation event
Activity/Failed Login if the moving average is increased by 300%.
Activity/
Failed Login per DataMonitor /All Data Monitors/ArcSight Shows a moving average of failed login
10 Minutes Solutions/GDPR/GDPR events. It displays data for the last 10 minutes
Access Activity/Access and will generate a correlation event if the
Activity/Failed Login moving average is increased by 300%.
Activity/
Failed Login - Top DataMonitor /All Data Monitors/ArcSight Shows the top 10 attacker addresses involved
Attacker IPs Solutions/GDPR/GDPR in failed login activity.
Access Activity/Access
Activity/Failed Login
Activity/
Failed Login - Top DataMonitor /All Data Monitors/ArcSight Shows the top 10 target addresses involved in
Target IPs Solutions/GDPR/GDPR failed login activity.
Access Activity/Access
Activity/Failed Login
Activity/
Failed Login - Top DataMonitor /All Data Monitors/ArcSight Shows the top 10 users involved in failed login
Users Solutions/GDPR/GDPR activity.
Access Activity/Access
Activity/Failed Login
Activity/
GeoView - Non DataMonitor /All Data Monitors/ArcSight This data monitor shows login activity from
EU Login Activity Solutions/GDPR/GDPR non EU countries on a map.
Access Activity/Access
Activity/Non EU Login
Activity/
Non EU Login DataMonitor /All Data Monitors/ArcSight Shows the top 10 attacker addresses involved
Activity - Top Solutions/GDPR/GDPR in successful login activity from non EU
Attacker IPs Access Activity/Access countries.
Activity/Non EU Login
Activity/
Non EU Login DataMonitor /All Data Monitors/ArcSight Shows the top 10 target addresses involved in
Activity - Top Solutions/GDPR/GDPR successful login activity from non EU
Target IPs Access Activity/Access countries.
Activity/Non EU Login
Activity/
Non EU Login DataMonitor /All Data Monitors/ArcSight Shows the top 10 users involved in successful
Activity - Top Solutions/GDPR/GDPR login activity from non EU countries.
Users Access Activity/Access
Activity/Non EU Login
Activity/
Building Access - DataMonitor /All Data Monitors/ArcSight Used to show the hour of day that users are
Event Graph Solutions/GDPR/GDPR accessing buildings.
Access Activity/Access
Activity/Physical Access
Activity/
Last 10 Building DataMonitor /All Data Monitors/ArcSight Shows the last 10 physical access events.
Access Events Solutions/GDPR/GDPR
Access Activity/Access
Activity/Physical Access
Activity/
Top Users DataMonitor /All Data Monitors/ArcSight Shows the top 10 users accessing buildings.
Accessing Solutions/GDPR/GDPR
Buildings Access Activity/Access
Activity/Physical Access
Activity/
Contractor DataMonitor /All Data Monitors/ArcSight Shows the top contractors accesses after
Access After Solutions/GDPR/GDPR hours.
Hours Access Activity/Access
Activity/Physical Access
Activity/
Successful Login DataMonitor /All Data Monitors/ArcSight Shows a moving average of successful login
Activity - Login Solutions/GDPR/GDPR events. It displays data for the last 10 minutes
per 10 Minutes Access Activity/Access and will generate a correlation event if the
Activity/Succesful Login moving average is increased by 300%.
Activity/
Successful Login DataMonitor /All Data Monitors/ArcSight Shows the top 10 attacker addresses involved
Activity - Top Solutions/GDPR/GDPR in successful login activity.
Attacker IPs Access Activity/Access
Activity/Succesful Login
Activity/
Successful Login DataMonitor /All Data Monitors/ArcSight Shows the top 10 target addresses involved in
Activity - Top Solutions/GDPR/GDPR successful login activity.
Target IPs Access Activity/Access
Activity/Succesful Login
Activity/
Successful Login DataMonitor /All Data Monitors/ArcSight Shows the top 10 users involved in successful
Activity - Top Solutions/GDPR/GDPR login activity.
Users Access Activity/Access
Activity/Succesful Login
Activity/
Suspicious Logins DataMonitor /All Data Monitors/ArcSight Shows a moving average of suspicious login
per 10 Minutes Solutions/GDPR/GDPR events. It displays data for the last 10 minutes
Access Activity/Access and will generate a correlation event if the
Activity/Succesful Login moving average is increased by 300%.
Activity/
Top 10 DoS DataMonitor /All Data Monitors/ArcSight This data monitor shows the top 10 DoS
Targets Solutions/GDPR/GDPR targets.
Attack Surface
Analysis/Security Controls
Risk Identification/
Top 10 DoS DataMonitor /All Data Monitors/ArcSight This data monitor shows the top 10 DoS
Attackers Solutions/GDPR/GDPR Attackers.
Attack Surface
Analysis/Security Controls
Risk Identification/
DoS Attacks DataMonitor /All Data Monitors/ArcSight This data monitor shows connection between
Event Ports - Solutions/GDPR/GDPR attacker and target machines and ports as
Event Graph Attack Surface they appear in denial of service attack events.
Analysis/Security Controls
Risk Identification/
DoS Attacks DataMonitor /All Data Monitors/ArcSight This data monitor shows connection between
Event Countries - Solutions/GDPR/GDPR attacker, target countries, machines and ports
Event Graph Attack Surface as they appear in denial of service attack
Analysis/Security Controls events.
Risk Identification/
GeoView - Data DataMonitor /All Data Monitors/ArcSight This data monitor shows Data Flow from
Flow from GDPR Solutions/GDPR/GDPR GDPR Systems to non EU countries on a map.
Systems to non Regulatory
EU Countries Exposure/Composite
Regulatory Exposure/Data
Flow from and to GDPR
Systems/
Data Flow from DataMonitor /All Data Monitors/ArcSight Shows the top 10 non EU source countries
non EU Countries Solutions/GDPR/GDPR involved on data flow from to GDPR Systems.
to GDPR Systems Regulatory
- Top non EU Exposure/Composite
Countries Regulatory Exposure/Data
Flow from and to GDPR
Systems/
Data Flow from DataMonitor /All Data Monitors/ArcSight Shows the top 10 non EU target countries
GDPR Systems to Solutions/GDPR/GDPR involved on data flow from GDPR systems.
non EU Countries Regulatory
- Top non EU Exposure/Composite
Countries Regulatory Exposure/Data
Flow from and to GDPR
Systems/
GeoView - Data DataMonitor /All Data Monitors/ArcSight This data monitor shows Data Flow from non
Flow from non Solutions/GDPR/GDPR EU countries to GDPR systems.
EU Countries to Regulatory
GDPR Systems Exposure/Composite
Regulatory Exposure/Data
Flow from and to GDPR
Systems/
Last 10 Events DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 10 data
Solutions/GDPR/GDPR flow events from GDPR systems to non EU
Regulatory Countries.
Exposure/Composite
Regulatory Exposure/Data
Flow from GDPR Systems to
non EU Countries/
Data Flow from DataMonitor /All Data Monitors/ArcSight Shows a moving average of data flow from
GDPR Systems to Solutions/GDPR/GDPR GDPR systems events to non EU Countries. It
non EU Countries Regulatory displays data for the last hour and will
per 10 Minutes Exposure/Composite generate a correlation event if the moving
Regulatory Exposure/Data average is increased by 500%.
Flow from GDPR Systems to
non EU Countries/
Top Target IPs DataMonitor /All Data Monitors/ArcSight Shows the top 10 target addresses involved
Solutions/GDPR/GDPR on data flow from GDPR systems to non EU
Regulatory countries.
Exposure/Composite
Regulatory Exposure/Data
Flow from GDPR Systems to
non EU Countries/
Top Source IPs DataMonitor /All Data Monitors/ArcSight Shows the top 10 source addresses involved
Solutions/GDPR/GDPR on data flow from GDPR systems to non EU
Regulatory countries.
Exposure/Composite
Regulatory Exposure/Data
Flow from GDPR Systems to
non EU Countries/
Data Flow from DataMonitor /All Data Monitors/ArcSight Shows a moving average of data flow from
non EU Countries Solutions/GDPR/GDPR non EU countries to GDPR system events. It
to GDPR Systems Regulatory displays data for the last hour and will
per 10 Minutes Exposure/Composite generate a correlation event if the moving
Regulatory Exposure/Data average is increased by 500%.
Flow from non EU Countries
to GDPR Systems/
Last 10 Events DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 10 data
Solutions/GDPR/GDPR flow events from non EU Countries to GDPR
Regulatory Systems
Exposure/Composite
Regulatory Exposure/Data
Flow from non EU Countries
to GDPR Systems/
Top Source IPs DataMonitor /All Data Monitors/ArcSight Shows the top 10 source addresses involved
Solutions/GDPR/GDPR on data flow from non EU countries to GDPR
Regulatory systems.
Exposure/Composite
Regulatory Exposure/Data
Flow from non EU Countries
to GDPR Systems/
Top Target IPs DataMonitor /All Data Monitors/ArcSight Shows the top 10 target addresses involved
Solutions/GDPR/GDPR on data flow from non EU countries to GDPR
Regulatory systems.
Exposure/Composite
Regulatory Exposure/Data
Flow from non EU Countries
to GDPR Systems/
Top 10 Attackers DataMonitor /All Data Monitors/ArcSight This data monitor shows the top 10 attackers
with High Risk Solutions/GDPR/GDPR involved on high risk events.
Events Regulatory
Exposure/Composite
Regulatory Exposure/High
Risk Events/
GeoView - High DataMonitor /All Data Monitors/ArcSight This data monitor shows high risk reported
Risk Events Solutions/GDPR/GDPR events on a map.
Regulatory
Exposure/Composite
Regulatory Exposure/High
Risk Events/
High Risk Events DataMonitor /All Data Monitors/ArcSight Shows a moving average of high risk event. It
per 10 Minutes Solutions/GDPR/GDPR displays data for the last 10 minutes and will
Regulatory generate a correlation event if the moving
Exposure/Composite average is increased by 300%.
Regulatory Exposure/High
Risk Events/
Last 10 High Risk DataMonitor /All Data Monitors/ArcSight This data monitor displays in real-time the last
Events Solutions/GDPR/GDPR 10 high risk events.
Regulatory
Exposure/Composite
Regulatory Exposure/High
Risk Events/
Top 10 Targets DataMonitor /All Data Monitors/ArcSight Provides an ordered list of the top 10 hosts
with High Risk Solutions/GDPR/GDPR with high priority events.
Events Regulatory
Exposure/Composite
Regulatory Exposure/High
Risk Events/
Top 10 Policy DataMonitor /All Data Monitors/ArcSight Shows the top 10 policy violators.
Violators Solutions/GDPR/GDPR
Regulatory
Exposure/Composite
Regulatory Exposure/Policy
Violations/
Top 10 Policy DataMonitor /All Data Monitors/ArcSight Shows the top 10 policy violation events.
Violations Solutions/GDPR/GDPR
Regulatory
Exposure/Composite
Regulatory Exposure/Policy
Violations/
GeoView - DoS DataMonitor /All Data Monitors/ArcSight This data monitor shows geo view of DoS
Activity Solutions/GDPR/GDPR Activity.
Regulatory
Exposure/Composite
Regulatory
Exposure/Threats/
GeoView - MITRE DataMonitor /All Data Monitors/ArcSight This data monitor shows geo view of MITRE
ATT&CK Activity Solutions/GDPR/GDPR ATT&CK Activity.
Regulatory
Exposure/Composite
Regulatory
Exposure/Threats/
GeoView - DataMonitor /All Data Monitors/ArcSight This data monitor shows geo view of
Reconnaissance Solutions/GDPR/GDPR Reconnaissance Activity.
Activity Regulatory
Exposure/Composite
Regulatory
Exposure/Threats/
Last 10 Threats DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 10 events
Solutions/GDPR/GDPR that indicate compromise, reconnaissance,
Regulatory hostile, or suspicious activity and MITRE
Exposure/Composite Attacks.
Regulatory
Exposure/Threats/
Worm DataMonitor /All Data Monitors/ArcSight This data monitor shows connection between
Propagation - Solutions/GDPR/GDPR attacker and target machines as they appear
Event Graph Threat Analysis/Internet in worm events.
Threat Analysis/
Personal DataMonitor /All Data Monitors/ArcSight Shows the top 10 users involved on personal
Information Solutions/GDPR/GDPR information leakage activity by Agent Severity
Leakage - Top Threat Analysis/Internet Distribution.
Users by Agent Threat Analysis/
Severity
Distribution
Personal DataMonitor /All Data Monitors/ArcSight Shows the top 10 target addresses involved
Information Solutions/GDPR/GDPR on personal information leakage activity.
Leakage - Top 10 Threat Analysis/Internet
Target IPs Threat Analysis/
Personal DataMonitor /All Data Monitors/ArcSight Shows the top 10 attacker addresses involved
Information Solutions/GDPR/GDPR on personal information leakage activity.
Leakage - Top 10 Threat Analysis/Internet
Attacker IPs Threat Analysis/
Last 10 Worm DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 10 worm
Events Solutions/GDPR/GDPR events.
Threat Analysis/Internet
Threat Analysis/
Worm Activity DataMonitor /All Data Monitors/ArcSight Shows a moving average of worm event. It
per 10 Minutes Solutions/GDPR/GDPR displays data for the last hour and will
Threat Analysis/Internet generate a correlation event if the moving
Threat Analysis/ average is increased by 500%.
Top 10 Target IPs DataMonitor /All Data Monitors/ArcSight Shows the top 10 target addresses involved
Solutions/GDPR/GDPR on attack and suspicious activity.
Threat Analysis/Internet
Threat Analysis/Attacks and
Suspicious Activity/
Top 10 Attacker DataMonitor /All Data Monitors/ArcSight Shows the top 10 attacker addresses involved
IPs Solutions/GDPR/GDPR on attack and suspicious activity.
Threat Analysis/Internet
Threat Analysis/Attacks and
Suspicious Activity/
Last 5 Attacks DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 5 attack
and Suspicious Solutions/GDPR/GDPR and suspicious activity events.
Activity Events Threat Analysis/Internet
Threat Analysis/Attacks and
Suspicious Activity/
Attacks and DataMonitor /All Data Monitors/ArcSight Shows a moving average of attacks. It displays
Suspicious Solutions/GDPR/GDPR data for the last 10 minutes and will generate
Activity per 10 Threat Analysis/Internet a correlation event if the moving average is
Minutes Threat Analysis/Attacks and increased by 300%.
Suspicious Activity/
Ports Used in DataMonitor /All Data Monitors/ArcSight This data monitor shows the ports used in
Attacks and Solutions/GDPR/GDPR attack and suspicious activity events. By
Suspicious Threat Analysis/Internet default the data monitor shows data from the
Activity Events Threat Analysis/Attacks and last 2 hours.
Suspicious Activity/
Last 20 MITRE DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 20 MITRE
ATT&CK Attack Solutions/GDPR/GDPR ATT&CK events.
Events Threat Analysis/Internet
Threat Analysis/MITRE
ATT&CK/
Top 10 Attackers DataMonitor /All Data Monitors/ArcSight This data monitor shows the top 10 MITRE
Solutions/GDPR/GDPR ATT&CK Attackers.
Threat Analysis/Internet
Threat Analysis/MITRE
ATT&CK/
Top 10 Targets DataMonitor /All Data Monitors/ArcSight This data monitor shows the top 10 MITRE
Solutions/GDPR/GDPR ATT&CK targets.
Threat Analysis/Internet
Threat Analysis/MITRE
ATT&CK/
Last 20 MITRE DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 20 MITRE
ATT&CK Attack Solutions/GDPR/GDPR ATT&CK events.
Events Threat Analysis/Internet
Threat Analysis/MITRE
ATT&CK/
Top 10 Users DataMonitor /All Data Monitors/ArcSight This data monitor shows the top 10 MITRE
Solutions/GDPR/GDPR ATT&CK users.
Threat Analysis/Internet
Threat Analysis/MITRE
ATT&CK/
Top 10 Attackers DataMonitor /All Data Monitors/ArcSight This data monitor shows the top 10
IPs Solutions/GDPR/GDPR reconnaissance activity attackers.
Threat Analysis/Internet
Threat Analysis/Recon
Activity/
Top 10 Target IPs DataMonitor /All Data Monitors/ArcSight This data monitor shows the top 10
Solutions/GDPR/GDPR reconnaissance activity targets.
Threat Analysis/Internet
Threat Analysis/Recon
Activity/
Last 10 Recon DataMonitor /All Data Monitors/ArcSight This data monitor displays the last 10 of
Events Solutions/GDPR/GDPR reconnaissance events.
Threat Analysis/Internet
Threat Analysis/Recon
Activity/
Recon Activity DataMonitor /All Data Monitors/ArcSight Shows a moving average of reconnaissance
per 10 Minutes Solutions/GDPR/GDPR activity. It displays data for the last 10
Threat Analysis/Internet minutes and will generate a correlation event
Threat Analysis/Recon if the moving average is increased by 300%.
Activity/
Compliance Risk DataMonitor /All Data Monitors/ArcSight This data monitor displays an icon indicating
Score Overview Solutions/GDPR/Overview/ the compliance risk score for each regulation
section. The compliance score is maintained
in the Compliance Score active list, and is
calculated based on the severity of the rules
that were triggered in the solution package.
Rules Attackers DataMonitor /All Data Monitors/ArcSight Event graph to show attacker-target pair
and Targets Solutions/GDPR/Overview/ relationship for the various rule firings from
this regulation.
Top 10 Attackers DataMonitor /All Data Monitors/ArcSight This data monitor shows which attackers are
in Rule Firings Solutions/GDPR/Overview/ most frequently involved in rule firings for this
regulation. This may reveal a trend about
certain attackers.
Top 10 Rules DataMonitor /All Data Monitors/ArcSight This data monitor shows which rules are most
Fired Solutions/GDPR/Overview/ frequently fired for this regulation. This may
reveal a trend about certain attacks.
Top 10 Targets in DataMonitor /All Data Monitors/ArcSight This data monitor shows which targets are
Rule Firings Solutions/GDPR/Overview/ most frequently involved in rule firings for this
regulation. This may reveal a trend about
certain targets.
Attacks and FieldSet /All Field Sets/ArcSight This field set contains essential fields required
Suspicious Solutions/GDPR/ to investigate attacks and suspicious activity
Activity through active channels and data monitors.
Data Flow Events FieldSet /All Field Sets/ArcSight This field set shows data flow event fields.
Solutions/GDPR/
MITRE ATT&CK FieldSet /All Field Sets/ArcSight This field sets selects fields related Mitre
Solutions/GDPR/ Att&ck.
User FieldSet /All Field Sets/ArcSight This field set selects fields related to
Authentication Solutions/GDPR/ authentication events.
Removal of Filter /All Filters/ArcSight Identifies events indicating user access right is
Access Rights Solutions/GDPR/GDPR removed.
Access Activity/Access
Activity/
Suspicious Logins Filter /All Filters/ArcSight This filter identifies Frequent Unsuccessful
Solutions/GDPR/GDPR logins by both administrative and non-
Access Activity/Access administrative users.
Activity/
Account Lockouts Filter /All Filters/ArcSight This filter is used to identify account lockouts.
Solutions/GDPR/GDPR By default it will recognize lockouts on
Access Activity/Access Microsoft Windows and Unix systems.
Activity/
Access Rights Filter /All Filters/ArcSight Selects events where a change was attempted
Changes Solutions/GDPR/GDPR for account access rights.
Access Activity/Access
Activity/
Building Access Filter /All Filters/ArcSight This filter selects all building access events.
Solutions/GDPR/GDPR
Access Activity/Physical
Access Activity/
Physical Access Filter /All Filters/ArcSight Selects all events sent to ArcSight ESM by
Events Solutions/GDPR/GDPR physical security systems.
Access Activity/Physical
Access Activity/
Successful After Filter /All Filters/ArcSight Selects all events indicating successful
Hours Building Solutions/GDPR/GDPR occurrences of physical access after business
Access Access Activity/Physical hours. The actual time definition is defined in
Access Activity/ the After Hours filter.
XSS Vulnerability Filter /All Filters/ArcSight Selects events indicating that an XSS
Detected Solutions/GDPR/GDPR vulnerability was detected.
Attack Surface
Analysis/Attack Surface
Identification/
Security Patch Filter /All Filters/ArcSight Selects events indicating that a security patch
Missing Solutions/GDPR/GDPR is missing.
Attack Surface
Analysis/Attack Surface
Identification/
SQL Injection Filter /All Filters/ArcSight Selects events indicating that SQL injection
Vulnerability Solutions/GDPR/GDPR vulnerability was detected.
Detected Attack Surface
Analysis/Attack Surface
Identification/
Format String Filter /All Filters/ArcSight Selects events indicating that a format string
Vulnerability Solutions/GDPR/GDPR vulnerability was detected.
Detected Attack Surface
Analysis/Attack Surface
Identification/
Password and Filter /All Filters/ArcSight Selects events indicating that Password and
Authentication Solutions/GDPR/GDPR Authentication Weaknesses was detected.
Weaknesses Attack Surface
Detected Analysis/Attack Surface
Identification/
WordPress GDPR Filter /All Filters/ArcSight Selects events indicating that a WordPress
Plugins Solutions/GDPR/GDPR GDPR Plugin vulnerability was detected.
Vulnerabilities Attack Surface
Analysis/Attack Surface
Identification/
Audit Log Cleared Filter /All Filters/ArcSight Selects all events where an audit log was
Solutions/GDPR/GDPR cleared from a host. By default it will
Attack Surface recognize events on Microsoft Windows and
Analysis/Security Controls Symantec Host IDS systems, modify this filter
Risk Identification/ to include events from other devices.
Failed Anti-Virus Filter /All Filters/ArcSight Looks for events when an attempt to update a
Updates Solutions/GDPR/GDPR virus signature on a host failed.
Attack Surface
Analysis/Security Controls
Risk Identification/
Security Log is Filter /All Filters/ArcSight The security log is now full.
Full Solutions/GDPR/GDPR
Attack Surface
Analysis/Security Controls
Risk Identification/
Policy Violations Filter /All Filters/ArcSight Filter in events with violation of policy.
Solutions/GDPR/GDPR
Regulatory
Exposure/Composite
Regulatory Exposure/
Microsoft SQL Filter /All Filters/ArcSight Selects events indicating that Microsoft SQL
Server Solutions/GDPR/GDPR Server vulnerability was detected.
Vulnerability Threat Analysis/Data Store
Detected Risk/
DB2 Vulnerability Filter /All Filters/ArcSight Selects events indicating that DB2
Detected Solutions/GDPR/GDPR vulnerability was detected.
Threat Analysis/Data Store
Risk/
Trojan Activity Filter /All Filters/ArcSight Selects events where trojan activity is
Solutions/GDPR/GDPR detected.
Threat Analysis/Internet
Threat Analysis/
Shell Code Filter /All Filters/ArcSight Selects events where shellCode execution is
Execution Solutions/GDPR/GDPR detected.
Detected Threat Analysis/Internet
Threat Analysis/
Worm Activity Filter /All Filters/ArcSight Selects events where worm activity is
Solutions/GDPR/GDPR detected.
Threat Analysis/Internet
Threat Analysis/
Virus Activity Filter /All Filters/ArcSight Identifies virus activities reported by either an
Solutions/GDPR/GDPR Intrusion Detection System (IDS) or an anti-
Threat Analysis/Internet virus application.
Threat Analysis/
Malware Activity Filter /All Filters/ArcSight Selects events where malicious code activity is
Solutions/GDPR/GDPR detected.
Threat Analysis/Internet
Threat Analysis/
Spyware Activity Filter /All Filters/ArcSight Identifies spyware activity reported by either
Solutions/GDPR/GDPR an Intrusion Detection System (IDS) or an anti-
Threat Analysis/Internet virus application.
Threat Analysis/
Email Attacks Filter /All Filters/ArcSight This filter detects events indicating an email
Solutions/GDPR/GDPR attack (like phishing, spam) occurred.
Threat Analysis/Internet
Threat Analysis/
Covert Channel Filter /All Filters/ArcSight This filter detects events indicating a covert
Solutions/GDPR/GDPR channel is being used.
Threat Analysis/Internet
Threat Analysis/
Clear Text Filter /All Filters/ArcSight This filter identifies a successful login or
Password Solutions/GDPR/GDPR access to a login page through unencrypted
Transmission Threat Analysis/Internet ports, which indicates that a user password
Threat Analysis/ might be transferred in clear text over the
network.
Anti-Virus Clean Filter /All Filters/ArcSight Looks for anti-virus events that indicate a
or Quarantine Solutions/GDPR/GDPR quarantine or cleaning attempt of a detected
Attempt Threat Analysis/Internet malware instance.
Threat Analysis/
Internal Recon Filter /All Filters/ArcSight This filter identifies events which indicate
Activity Solutions/GDPR/GDPR internal reconnaissance.
Threat Analysis/Intranet
Threat Analysis/
Windows Events Filter /All Filters/ArcSight This filters identified Microsoft Windows
with a Non- Solutions/GDPR/General events that have a non machine/system user
Machine User Filters/ either in the attacker or the target fields.
Target User Filter /All Filters/ArcSight This filter checks whether the Target User
Present Solutions/GDPR/General Name field is populated.
Filters/
Target Host or Filter /All Filters/ArcSight This filter identifies events that have either
Address Present Solutions/GDPR/General the Target Host Name or Target Address
Filters/ event fields populated.
High Priority Filter /All Filters/ArcSight This filter shows events in which the Priority
Events with Solutions/GDPR/General field is 9 or 10 with target info.
Target Info Filters/
High Priority Filter /All Filters/ArcSight This filter shows events in which the Priority
Events with Solutions/GDPR/General field is 9 or 10 with attacker info.
Attacker Info Filters/
High Priority Filter /All Filters/ArcSight This filter shows events in which the Priority
Events Solutions/GDPR/General field is 9 or 10.
Filters/
Attacker or Filter /All Filters/ArcSight This filter identifies events that have either
Target User Solutions/GDPR/General the Attacker User Name or Target User Name
Present Filters/ event fields populated.
Attacker User Filter /All Filters/ArcSight This filter identifies events that have the
Present Solutions/GDPR/General Attacker User Name event fields populated.
Filters/
Target Asset is EU Filter /All Filters/ArcSight This filter selects events targeting EU
Solutions/GDPR/General Countries.
Filters/Assets/
Target Asset is Filter /All Filters/ArcSight This filter selects events targeting database
Database Solutions/GDPR/General hosts.
Filters/Assets/
Internal Targets Filter /All Filters/ArcSight This filter looks for events targeting systems
Solutions/GDPR/General inside the organization network.
Filters/Assets/
Internal Attackers Filter /All Filters/ArcSight This filter looks for events coming from
Solutions/GDPR/General systems inside the organization network.
Filters/Assets/
Attacker Asset is Filter /All Filters/ArcSight This filter selects events originated from PII
PII Solutions/GDPR/General assets.
Filters/Assets/
Attacker Asset is Filter /All Filters/ArcSight This filter selects events originated from EU
EU Solutions/GDPR/General Countries.
Filters/Assets/
Target Asset is PII Filter /All Filters/ArcSight This filter selects events targeting PII hosts.
Solutions/GDPR/General
Filters/Assets/
MITRE ATT&CK Filter /All Filters/ArcSight This filter identifies MITRE ATT&CK events
Activity with User Solutions/GDPR/General with user info.
Info Filters/Attacks/
Threats Filter /All Filters/ArcSight This filter identifies events that indicate
Solutions/GDPR/General compromise, reconnaissance, hostile, or
Filters/Attacks/ suspicious activity and MITRE Attacks.
Recon Activity Filter /All Filters/ArcSight This filter identifies events that indicate
Solutions/GDPR/General reconnaissance activity.
Filters/Attacks/
MITRE ATT&CK Filter /All Filters/ArcSight This filter identifies MITRE ATT&CK events
Activity with Solutions/GDPR/General with target info.
Target Info Filters/Attacks/
Attacks with Port Filter /All Filters/ArcSight This filter identifies events with port info
Info Solutions/GDPR/General which indicate compromise, reconnaissance,
Filters/Attacks/ hostile, or suspicious activity.
MITRE ATT&CK Filter /All Filters/ArcSight This filter identifies MITRE ATT&CK events.
Activity Solutions/GDPR/General
Filters/Attacks/
Exploitation Filter /All Filters/ArcSight This filter identifies events which indicate
Activity Solutions/GDPR/General exploitation activity.
Filters/Attacks/
DoS Attacks with Filter /All Filters/ArcSight This filter identifies denial of service attacks
Geo Information Solutions/GDPR/General with geo information.
Filters/Attacks/
DoS Attacks Filter /All Filters/ArcSight This filter identifies reported denial of service
Solutions/GDPR/General attacks.
Filters/Attacks/
Attacks with Filter /All Filters/ArcSight This filter identifies events with target info
Target Info Solutions/GDPR/General which indicate compromise, reconnaissance,
Filters/Attacks/ hostile, or suspicious activity.
Attacks with Geo Filter /All Filters/ArcSight This filter selects attack events with
Information Solutions/GDPR/General populated Geo fields for both the attacker
Filters/Attacks/ and target addresses.
Attacks with Filter /All Filters/ArcSight This filter identifies events with attacker info
Attacker Info Solutions/GDPR/General which indicate compromise, reconnaissance,
Filters/Attacks/ hostile, or suspicious activity.
Attacks and Filter /All Filters/ArcSight This filter identifies events which indicate
Suspicious Solutions/GDPR/General compromise, reconnaissance, hostile, or
Activity Filters/Attacks/ suspicious activity.
MITRE ATT&CK Filter /All Filters/ArcSight This filter identifies MITRE ATT&CK events
Activity with Solutions/GDPR/General with attacker info.
Attacker Info Filters/Attacks/
Unsuccessful Filter /All Filters/ArcSight This filter identified failed logins by both
Logins with Solutions/GDPR/General administrative and non-administrative users
Attacker and Filters/Authentication/ with attacker and target info.
Target Info
Unsuccessful Filter /All Filters/ArcSight This filter identified failed logins by both
Logins with Solutions/GDPR/General administrative and non-administrative users
Target Info Filters/Authentication/ with target info.
Unsuccessful Filter /All Filters/ArcSight This filter identified failed logins by both
Logins with Solutions/GDPR/General administrative and non-administrative users
Attacker and Filters/Authentication/ with attacker and user info.
User Info
Unsuccessful Filter /All Filters/ArcSight This filter identified failed logins by both
Logins with Solutions/GDPR/General administrative and non-administrative users
Attacker Info Filters/Authentication/ with attacker info.
Successful Logins Filter /All Filters/ArcSight This filter identifies successful logins by both
with Target Info Solutions/GDPR/General administrative and non-administrative users
Filters/Authentication/ with target info.
Successful Logins Filter /All Filters/ArcSight This filter identifies successful logins by both
from non EU Solutions/GDPR/General administrative and non-administrative users
Countries with Filters/Authentication/ from non EU countries with target info.
Target Info
Successful Logins Filter /All Filters/ArcSight This filter identifies successful logins by both
with Attacker Solutions/GDPR/General administrative and non-administrative users
Info Filters/Authentication/ with attacker info.
Successful Logins Filter /All Filters/ArcSight This filter identifies successful logins by both
from non EU Solutions/GDPR/General administrative and non-administrative users
Countries with Filters/Authentication/ from non EU countries with user info.
User Info
Successful Logins Filter /All Filters/ArcSight This filter identifies successful logins by both
Solutions/GDPR/General administrative and non-administrative users.
Filters/Authentication/
Successful Logins Filter /All Filters/ArcSight This filter identifies successful logins by both
from non EU Solutions/GDPR/General administrative and non-administrative users
Countries with Filters/Authentication/ from non EU countries with attacker info.
Attacker Info
Successful Logins Filter /All Filters/ArcSight This filter identifies successful logins by both
from non EU Solutions/GDPR/General administrative and non-administrative users
Countries Filters/Authentication/ from non EU countries.
Unsuccessful Filter /All Filters/ArcSight This filter identified failed logins by both
Logins Solutions/GDPR/General administrative and non-administrative users.
Filters/Authentication/
Login Attempts Filter /All Filters/ArcSight This filter selects any attempts at logging into
Solutions/GDPR/General systems. It excludes machine logins into
Filters/Authentication/ Microsoft Windows systems.
Inbound Events Filter /All Filters/ArcSight This filter looks for events coming from
Solutions/GDPR/General outside the organization network targeting
Filters/Data Flow/ internal networks .
Inbound Events Filter /All Filters/ArcSight This filter looks for events coming from non
from non EU Solutions/GDPR/General EU Countries targeting internal networks .
Countries Filters/Data Flow/
Outbound Events Filter /All Filters/ArcSight This filter looks for events coming from inside
Solutions/GDPR/General the organization network targeting the public
Filters/Data Flow/ network.
Outbound Events Filter /All Filters/ArcSight This filter looks for events coming from inside
to Non EU Solutions/GDPR/General the organization network targeting non EU
Countries Filters/Data Flow/ countries.
Firewall Deny Filter /All Filters/ArcSight This filter selects events where a firewall
Solutions/GDPR/General denied passage to traffic.
Filters/Firewall/
Personal Records Filter /All Filters/ArcSight This filter identifies information leaks with
Information Leak Solutions/GDPR/General regard to personal information.
with User Info Filters/Information Leakage/
Organizational Filter /All Filters/ArcSight This filter identifies information leaks with
Records Solutions/GDPR/General regard to company information.
Information Leak Filters/Information Leakage/
Encrypted Filter /All Filters/ArcSight This filter identifies information leaks with
Communication Solutions/GDPR/General regard to encrypted communication on the
Information Filters/Information Leakage/ network.
Leaks
Personal Records Filter /All Filters/ArcSight This filter identifies information leaks with
Information Leak Solutions/GDPR/General regard to personal information.
Filters/Information Leakage/
Insecure Services Filter /All Filters/ArcSight Selects events based on inherently insecure
Solutions/GDPR/General services.
Filters/Insecure Services/
GDPR Rule Firing Filter /All Filters/ArcSight This filter selects all rule firing events, where
with Target Info Solutions/GDPR/General the rule is a part of the compliance content
Filters/Overview/Risk Score and has target info.
Dashboard Overview/
Compliance Score Filter /All Filters/ArcSight This filter identifies events that are generated
Updates Solutions/GDPR/General when values in the Compliance Score active
Filters/Overview/Risk Score list are changed.
Dashboard Overview/
GDPR Rule Firing Filter /All Filters/ArcSight This filter selects all rule firing events, where
with Attacker Solutions/GDPR/General the rule is a part of the compliance content
Info Filters/Overview/Risk Score and has attacker info.
Dashboard Overview/
GDPR Rule Firing Filter /All Filters/ArcSight This filter selects all GDPR rules firing events.
Solutions/GDPR/General
Filters/Overview/Risk Score
Dashboard Overview/
GDPR Rule Firing Filter /All Filters/ArcSight This filter selects all rule firing events, where
with Attacker and Solutions/GDPR/General the rule is a part of the compliance content
Target Info Filters/Overview/Risk Score and has attacker and target info.
Dashboard Overview/
Limit Regulation Filter /All Filters/ArcSight The purpose of this filter is to ensure that the
Solutions/GDPR/My Filters/ solution only processes events that are
addressed by the regulation.
After Hours Filter /All Filters/ArcSight This filter defines the time period of 'after
Solutions/GDPR/My Filters/ hours'. Change this filter to adjust the default
settings.
GDPR Rule Firing QueryViewer /All Query Viewers/ArcSight Provides a listing of GDPR correlation events
Events Solutions/GDPR/Overview/ on the last hour.
User Logged in to Rule /All Rules/ArcSight Fires when someone is using the same user
different Targets Solutions/GDPR/GDPR name to login to different targets, This may
on Short Period Access Activity/Access indicate user name sharing.
of Time Activity/
Password Spray Rule /All Rules/ArcSight Detects password spray attack on windows
Attack Solutions/GDPR/GDPR systems.
Access Activity/Access
Activity/
User Logged in Rule /All Rules/ArcSight This rule fires when someone is using the
from Two Solutions/GDPR/GDPR same user name to login from two different
Countries Access Activity/Access countries. This may indicate user name
Activity/ sharing.
User Logged in Rule /All Rules/ArcSight Fires when someone is using the same user
from different IP Solutions/GDPR/GDPR name to login from different ip addresses.
Addresses Access Activity/Access This may indicate user name sharing.
Activity/
Suspicious Logins Rule /All Rules/ArcSight This rule looks for an exponential increase of
Activity Increased Solutions/GDPR/GDPR suspicious login events.
Exponentially in Access Activity/Access
less than 10 Activity/
Minutes
Before deploying this rule make sure the
following data monitor
are enabled.
Frequent Rule /All Rules/ArcSight Fires when it notices the same user is
Unsuccessful Solutions/GDPR/GDPR responsible for a continuous set of
Logins by User Access Activity/Access unsuccessful logins.
Name Activity/
Frequent Rule /All Rules/ArcSight This rule looks for an exponential increase of
Unsuccessful Solutions/GDPR/GDPR frequent failed login events.
Logins Activity Access Activity/Access
Increased Activity/
Exponentially in
less than 10 Before deploying this rule make sure the
Minutes following data monitor
are enabled.
Failed Building Rule /All Rules/ArcSight Detects failed physical building access.
Access Solutions/GDPR/GDPR
Access Activity/Access
Activity/
Failed Access by Rule /All Rules/ArcSight Detects failed physical access by the same
the Same User to Solutions/GDPR/GDPR user to multiple buildings on short period of
Multiple Access Activity/Access time.
Buildings Activity/
After Hours Rule /All Rules/ArcSight Detects building access events after business
Building Access Solutions/GDPR/GDPR hours by contractors.
by Contractors Access Activity/Access
Activity/
Account Lockout Rule /All Rules/ArcSight This rule detects account lockouts.
Solutions/GDPR/GDPR
Access Activity/Access
Activity/
Frequent Rule /All Rules/ArcSight This rule fires when it notices a continuous set
Unsuccessful Solutions/GDPR/GDPR of unsuccessful user logins from non EU
Logins from non Access Activity/Access countries to PII assets.
EU Countries to Activity/
PII Asset Please use this rule when you didn't expect
login from non EU countries to your PII Asset.
User Logged in Rule /All Rules/ArcSight This rule fires when there is a login from non
from non EU Solutions/GDPR/GDPR EU countries to PII Assets.
Countries to PII Access Activity/Access
Asset Activity/ Please use this rule when you didn't expect
login from non EU countries to your PII Asset.
WordPress GDPR Rule /All Rules/ArcSight Triggers when a WorldPress GDPR Plugin
Plugins Solutions/GDPR/GDPR vulnerability is detected.
Vulnerabilities Attack Surface
Analysis/Attack Surface
Identification/
OR
Security Patch Rule /All Rules/ArcSight Triggers when a security patch missing
Missing Solutions/GDPR/GDPR vulnerability is detected.
Attack Surface
Analysis/Attack Surface
Identification/
SQL Injection Rule /All Rules/ArcSight Triggers when SQL Injection vulnerability is
Vulnerabilities Solutions/GDPR/GDPR detected.
Attack Surface
Analysis/Attack Surface
Identification/
Password and Rule /All Rules/ArcSight Triggers when a password and authentication
Authentication Solutions/GDPR/GDPR weaknesses are detected.
Weaknesses Attack Surface
Analysis/Attack Surface
Identification/
Non Fixed Rule /All Rules/ArcSight Triggers when a non fixed security patch
Security Patch Solutions/GDPR/GDPR detected.
Detected Attack Surface
Analysis/Attack Surface
Identification/
before enabling and deploying this rule please
make sure the following rule:
Information Rule /All Rules/ArcSight This rule looks for information disclosure
Disclosure Solutions/GDPR/GDPR vulnerability detected on multiple PII Assets.
Vulnerability Attack Surface
Detected on Analysis/Attack Surface
Multiple PII Identification/
Assets Note : In order for this rule to be triggered the
PII assets should be categorized with the "/All
Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Network Domains/Electronic PII".
High Risk Rule /All Rules/ArcSight Triggers when a high risk vulnerability is
Vulnerability Solutions/GDPR/GDPR detected.
Detected Attack Surface
Analysis/Attack Surface
Identification/
Format String Rule /All Rules/ArcSight Triggers when format string vulnerability is
Vulnerabilities Solutions/GDPR/GDPR detected.
Attack Surface
Analysis/Attack Surface
Identification/
Security Log is Rule /All Rules/ArcSight Triggers when security Log is full.
Full Solutions/GDPR/GDPR
Attack Surface
Analysis/Security Controls
Risk Identification/
Potential Rule /All Rules/ArcSight This rule looks for Potential Distributed DoS.
Distributed DoS Solutions/GDPR/GDPR
Attack Surface Before deploying this rule make sure rule
Analysis/Security Controls "DoS Detected" is enabled .
Risk Identification/
Password not Rule /All Rules/ArcSight Fires when an entry expires out of the
Changed for Solutions/GDPR/GDPR referenced active list, signifying that the new
Longer than Attack Surface (default) password was not changed within
Policy Standard Analysis/Security Controls the prescribed time. Time limit is defined by
Risk Identification/ the TTL in the active list.
Failed Anti-Virus Rule /All Rules/ArcSight This rule detects failed anti-virus updates.
Updates Solutions/GDPR/GDPR
Attack Surface
Analysis/Security Controls
Risk Identification/
Critical Change Rule /All Rules/ArcSight Triggers when there are PII environment
on multiple PII Solutions/GDPR/GDPR configuration change detected and has Very-
Assets Attack Surface High agent severity.
Analysis/Security Controls
Risk Identification/
Asset not Rule /All Rules/ArcSight Fires when an entry expires out of the
Scanned for Solutions/GDPR/GDPR referenced active list, signifying that asset
Longer than Attack Surface didn’t scanned within the prescribed time.
Policy Standard Analysis/Security Controls Time limit is defined by the TTL in the active
Risk Identification/ list (default 60 days).
Asset Scanned Rule /All Rules/ArcSight This rule detects vulnerability scans against a
Solutions/GDPR/GDPR specific asset and adds the asset to the active
Attack Surface list.
Analysis/Security Controls
Risk Identification/
DoS Detected Rule /All Rules/ArcSight This rule looks for DoS.
Solutions/GDPR/GDPR
Attack Surface
Analysis/Security Controls
Risk Identification/
Audit Log Cleared Rule /All Rules/ArcSight Monitors for events on clearing of the audit
Solutions/GDPR/GDPR log on Windows systems.
Attack Surface
Analysis/Security Controls
Risk Identification/
Security Software Rule /All Rules/ArcSight Triggers when a security software service has
Stopped or Solutions/GDPR/GDPR been disabled, refer to the condition tab of
Paused Attack Surface this rule for the list of such services.
Analysis/Security Controls
Risk Identification/
Multiple Policy Rule /All Rules/ArcSight This rule looks for multiple policy violations
Violations Solutions/GDPR/GDPR against PII assets.
Against PII Assets Regulatory
Exposure/Composite
Regulatory Exposure/
Note : In order for this rule to be triggered :
Policy Violations Rule /All Rules/ArcSight This rule looks for policy violations.
Solutions/GDPR/GDPR
Regulatory
Exposure/Composite
Regulatory Exposure/
Internal Data Rule /All Rules/ArcSight This rule looks for internal data flow non EU
Flow from non Solutions/GDPR/GDPR countries to PII asset.
EU to PII Asset Regulatory
Exposure/Composite
Regulatory Exposure/
Note : In order for this rule to be triggered the
PII assets should be categorized with the "/All
Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Network Domains/Electronic PII" and
your internal assets should be categorized
with "/All Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Address Spaces/Protected/".
Threats from non Rule /All Rules/ArcSight This rule looks for threats from non EU to PII
EU to PII Asset Solutions/GDPR/GDPR asset.
Regulatory
Exposure/Composite
Regulatory Exposure/
Note : In order for this rule to be triggered the
PII assets should be categorized with the "/All
Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Network Domains/Electronic PII".
High Risk Events Rule /All Rules/ArcSight This rule looks for an exponential increase of
Increased Solutions/GDPR/GDPR high risk events. Before deploying this rule
Exponentially in Regulatory make sure this data monitor "High Risk Events
less than 10 Exposure/Composite per 10 Minutes" is enabled.
Minutes Regulatory Exposure/
External Data Rule /All Rules/ArcSight This rule looks for external data flow non EU
Flow from non Solutions/GDPR/GDPR countries to PII asset.
EU to PII Asset Regulatory
Exposure/Composite
Regulatory Exposure/
Note : In order for this rule to be triggered the
PII assets should be categorized with the "/All
Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Network Domains/Electronic PII" and
your internal assets should be categorized
with "/All Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Address Spaces/Protected/".
External Data Rule /All Rules/ArcSight This rule looks for external data flow from PII
Flow from PII Solutions/GDPR/GDPR asset to non EU countries.
Asset to non EU Regulatory
Exposure/Composite
Regulatory Exposure/
Note : In order for this rule to be triggered the
PII assets should be categorized with the "/All
Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Network Domains/Electronic PII" and
your internal assets should be categorized
with "/All Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Address Spaces/Protected/".
Internal Data Rule /All Rules/ArcSight This rule looks for internal data flow from PII
Flow from PII Solutions/GDPR/GDPR asset to non EU countries.
Asset to non EU Regulatory
Exposure/Composite
Regulatory Exposure/
Note : In order for this rule to be triggered the
PII assets should be categorized with the "/All
Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Network Domains/Electronic PII" and
your internal assets should be categorized
with "/All Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Address Spaces/Protected/".
Microsoft SQL Rule /All Rules/ArcSight Triggers when Microsoft SQL Server
Server Solutions/GDPR/GDPR vulnerability is detected.
Vulnerabilities Threat Analysis/Data Store
Risk/
Exploit Executed Rule /All Rules/ArcSight This rule detects exploit executed against
on Database Solutions/GDPR/GDPR database assets.
Asset Threat Analysis/Data Store
Risk/
CRM or ERP Rule /All Rules/ArcSight Triggers when CRM or ERP vulnerability is
Vulnerabilities Solutions/GDPR/GDPR detected.
Threat Analysis/Data Store
Risk/
Possible DNS Rule /All Rules/ArcSight This rule looks for command and control DNS
Based Zombie Solutions/GDPR/GDPR zombies in the organization.
Threat Analysis/Internet
Threat Analysis/
Possible Rule /All Rules/ArcSight This rule looks for events indicating a
Directory Solutions/GDPR/GDPR directory traversal attack is being used.
Traversal Threat Analysis/Internet
Threat Analysis/
Possible Email Rule /All Rules/ArcSight This rule looks for attacks where email activity
Attack Solutions/GDPR/GDPR involved.
Threat Analysis/Internet
Threat Analysis/
Possible HTTP Rule /All Rules/ArcSight This rule looks for command and control HTTP
Based Zombie Solutions/GDPR/GDPR based zombies on the organization.
Threat Analysis/Internet
Threat Analysis/
Possible Rule /All Rules/ArcSight This rule looks for attacks where information
Information Solutions/GDPR/GDPR could be redirected and collected by an
Interception Threat Analysis/Internet unintended party.
Threat Analysis/
Possible Spear Rule /All Rules/ArcSight This rule identifies potential spear phishing
Phishing Attack Solutions/GDPR/GDPR attack, before deploying this rule please make
Threat Analysis/Internet sure to add high profile email addresses to
Threat Analysis/ the “Important Emails†active list.
Possible SMTP Rule /All Rules/ArcSight This rule looks for command and control
Based Zombie Solutions/GDPR/GDPR SMTP based zombies in the organization.
Threat Analysis/Internet
Threat Analysis/
Potential Worm Rule /All Rules/ArcSight Triggers when a worm propagated internally.
Propagated Solutions/GDPR/GDPR
Internally Threat Analysis/Internet
Threat Analysis/
Before deploying this rule please make sure
the following rule :
Worm Detected
Possible Covert Rule /All Rules/ArcSight This rule looks for events indicating a covert
Channel Solutions/GDPR/GDPR channel is being used.
Threat Analysis/Internet
Threat Analysis/
Worm Detected Rule /All Rules/ArcSight Triggers when a worm is reported by either an
Solutions/GDPR/GDPR Intrusion Detection System (IDS) or an anti-
Threat Analysis/Internet virus application.
Threat Analysis/
Possible Botnet Rule /All Rules/ArcSight This rule looks for command and control
Activity Solutions/GDPR/GDPR zombies in the organization.
Threat Analysis/Internet
Threat Analysis/ Before enabling and deploying this rule,
please make sure the following active list:
"DMZ Assets" includes the relevant assets.
Exploit Executed Rule /All Rules/ArcSight This rule detects exploit executed against PII
Against PII Asset Solutions/GDPR/GDPR assets.
Threat Analysis/Internet
Threat Analysis/
Personal Rule /All Rules/ArcSight This rule looks for any personal information
Information Leak Solutions/GDPR/GDPR being sent out of the corporate network.
Threat Analysis/Internet
Threat Analysis/
Organizational Rule /All Rules/ArcSight This rule looks for any organizational
Data Information Solutions/GDPR/GDPR information being sent out of the corporate
Leak Threat Analysis/Internet network.
Threat Analysis/
Malware Rule /All Rules/ArcSight Triggers when malware detected on PII asset.
Detected on PII Solutions/GDPR/GDPR
Asset Threat Analysis/Internet
Threat Analysis/
Note : In order for this rule to be triggered the
PII assets should be categorized with the /All
Assets Categories/Compliance Insight
Package/Network Domains/Electronic PII.
MITRE ATT&CK Rule /All Rules/ArcSight This rule looks for mitre techniques detected
Techniques Solutions/GDPR/GDPR on multiple PII Assets on short period of time.
Detected on Threat Analysis/Internet
Multiple PII Asset Threat Analysis/
Exploit Executed Rule /All Rules/ArcSight This rule detects exploit executed against
Against Solutions/GDPR/GDPR WordPress GDPR Plugins.
WordPress GDPR Threat Analysis/Internet
Plugins Threat Analysis/
Excessive Blocked Rule /All Rules/ArcSight This rule looks for possible excessive blocked
Firewall Traffic Solutions/GDPR/GDPR firewall traffic from the same source.
from the same Threat Analysis/Internet
Source Threat Analysis/
Encrypted Rule /All Rules/ArcSight This rule looks for any encrypted
Communication Solutions/GDPR/GDPR communication Information Leaks on the
Information Threat Analysis/Internet network.
Leaks Threat Analysis/
Clear Text Rule /All Rules/ArcSight This rule looks for events indicating a clear
Password Solutions/GDPR/GDPR text password transmission.
Transmission Threat Analysis/Internet
Threat Analysis/
Attacks Increased Rule /All Rules/ArcSight This rule looks for an exponential increase of
Exponentially in Solutions/GDPR/GDPR attack and suspicious activity events.
less than 10 Threat Analysis/Internet
Minutes Threat Analysis/
Personal Rule /All Rules/ArcSight This rule looks for an exponential increase of
Information Leak Solutions/GDPR/GDPR personal information leaks events.
Increased Threat Analysis/Internet
Exponentially in Threat Analysis/
less than 10
Minutes Before deploying this rule make sure this data
monitor "Personal Information Leakage per
10 Minutes" is enabled .
Multiple MITRE Rule /All Rules/ArcSight This rule looks for multiple mitre techniques
ATT&CK Solutions/GDPR/GDPR detected on PII Asset on short period of time.
Techniques Threat Analysis/Internet
Detected on PII Threat Analysis/
Asset
Note : In order for this rule to be triggered the
PII assets should be categorized with the /All
Assets Categories/ArcSight
Solutions/Compliance Insight
Package/Network Domains/Electronic PII.
Internal Insecure Rule /All Rules/ArcSight Detects when insecure protocols, such as
Service Provider Solutions/GDPR/GDPR Telnet or RSH, are used inside the network
Detected Threat Analysis/Intranet when triggered.
Threat Analysis/
Internal Recon Rule /All Rules/ArcSight This rule looks for internal reconnaissance
Detected Solutions/GDPR/GDPR activity.
Threat Analysis/Intranet
Threat Analysis/
Compliance Score Rule /All Rules/ArcSight This rule is triggered by other GDPR rules and
Update Solutions/GDPR/Overview/ updates the Compliance Risk Score active list.
Manual Status Rule /All Rules/ArcSight This rule is triggered when a section's status
Change Solutions/GDPR/Overview/ on the Compliance Risk Score dashboard is
changed manually.
User Logged in from non Rule /All Rules/ArcSight /All Assets Categories/ArcSight
EU Countries to PII Asset Solutions/GDPR/GDPR Access Solutions/Compliance Insight
Activity/Access Activity/ Package/Network Domains/Electronic
PII
External Data Flow from Rule /All Rules/ArcSight /All Assets Categories/ArcSight
non EU to PII Asset Solutions/GDPR/GDPR Regulatory Solutions/Compliance Insight
Exposure/Composite Regulatory Package/Network Domains/Electronic
Exposure PII
External Data Flow from Rule /All Rules/ArcSight /All Assets Categories/ArcSight
PII Asset to non EU Solutions/GDPR/GDPR Regulatory Solutions/Compliance Insight
Exposure/Composite Regulatory Package/Network Domains/Electronic
Exposure PII
Internal Data Flow from Rule /All Rules/ArcSight /All Assets Categories/ArcSight
non EU to PII Asset Solutions/GDPR/GDPR Regulatory Solutions/Compliance Insight
Exposure/Composite Regulatory Package/Network Domains/Electronic
Exposure PII
Internal Data Flow from Rule /All Rules/ArcSight /All Assets Categories/ArcSight
PII Asset to non EU Solutions/GDPR/GDPR Regulatory Solutions/Compliance Insight
Exposure/Composite Regulatory Package/Network Domains/Electronic
Exposure PII
Critical Database Change Rule /All Rules/ArcSight /All Asset Categories/Site Asset
Detected Solutions/GDPR/GDPR Threat Categories/Business Impact
Analysis/Data Store Risk Analysis/Business
Role/Service/Database