Access Attempt Through Ex-Employee IDs
Access Attempt Through Ex-Employee IDs
Rule Description
Use Case category
Alert Category
Log sources required
used case logic
Impact
Quick Remediation
Permanent Remediation
From AD server
Source IP
Source Username
Source Hostname
Destination IP
Destination Hostname
Destination Username
Logon Type
Device Address
Device Hostname
Time
If any login attempts observed from Ex-employees/personnel ID's this alert should trigger
If any unauthorized user trying to access and got access to the server may perform some unwanted changes
which will not be able to track
1. Need to check why login attempts are happenning from Ex-emp ID's which can be tracked by source
hostnname.
2. Need to check Service/Background application that might be tying to get authenticated with saved/cached
credentials and clear the same if any.
1. Need to check Service/Background application that might be tying to get authenticated with saved/cached
credentials and clear the same if any.2. Need to clear the cache in brower which may contain saved
credentials of Ex-employees
1. Need to check Service/Background application that might be tying to get authenticated with saved/cached
credentials and clear the same if any.2. Need to clear the cache in brower which may contain saved
credentials of Ex-employees
Rule Name
Rule Description
Use Case category
Alert Category
Log sources required
Impact
Quick Remediation
Permanent Remediation
Event Description
Source IP
Source Username
Source Hostname
Destination IP
Destination Hostname
Destination Username
Device Address
Device Hostname
Time
Proxy_BlockReason (custom)
Proxy_URL (custom)
Proxy_URL_Category (custom)
This happens when any user contiously trying the access the URL and getting denied by proxy
1. If we are observing huge number of traffics which may affect the proxy utilization
2. There might be source machine be infected
1. Need to check and guide the source user that he should not try to access the blocked sites.
2. If it is legitimate request then need to allow in proxy.
1. Need to check whether source is infected by any virus or malware which may cause these type of traffics to be generated to
2. Need to scan the source machine completely.
1. Need to check whether source is infected by any virus or malware which may cause these type of traffics to be generated to
2. Need to scan the source machine completely.
Rule Name
Rule Description
Use Case category
Alert Category
Log sources required
used case logic
Fields Required
Event Name
Event Properties
Username
Source IP
Destination IP
Destination Hostname
Device IP
we observe more number of deny events if any unauthorized user tried to access the proxy and getting denied
1. If any unauthorized user gained access and might do any changes in the configuration.
1. Need to check who is trying to access the proxy and guide them to not to access the same if he is unauthorized.
1. Need to check who is trying to access the proxy and guide them to not to access the same if he is unauthorized.
Rule Name
Rule Description
Use Case category
Alert Category
Log sources required
Impact
Quick Remediation
Permanent Remediation
Root Cause
Social_Media_Usage_Observed
This rule will trigger when any user accessing any social media
Unauthorized access
Unauthorized access
Proxy
and when the event(s) were detected by one or more of McAfee Web Gateway
and when the event matches Proxy_URL_Category (custom) is any of Social Networking
and when the event matches Event Name is Allowed
Event name
Source IP
Source Hostname
Destination IP
Destination Hostname
Destination port
username
Device IP
Device Hostname
Proxy_URL (custom)
Proxy_URL_Category (custom)