Page Contents
- NON-MITRE ATT&CK Analytics
- LP_Windows Login Attempt on Disabled Account
- LP_VMware Link Up
- LP_VMware Link Down
- LP_LogPoint License Expiry Status
- LP_Mitre Initial Access Using Spearphishing link Detected
- LP_Mitre Command and Control Using Standard Application Layer Protocol Detected
- LP_Endpoint Protect Threat Content Detected
- LP_Endpoint Protect Device Disconnect
- LP_Endpoint Protect File Delete
- LP_Endpoint Protect File Copied To USB Device
- LP_System Owner or User Discovery Process Detected
- LP_System Services Discovery Detected
- LP_SolarisLDAP Password Spraying Attack Detected
- LP_Microsoft Defender AMSI Trigger
- LP_Petitpotam - Anonymous RPC and File Share
- LP_Secure Deletion with SDelete
- LP_Suspicious Keyboard Layout Load Detected
- LP_Remote Code Execution using WMI Win32_Process Class over WinRM
- LP_Suspicious Microsoft SQL Server PowerShell Module Use Detected
- LP_Shadow Copy Deletion Using OS Utilities Detected
- LP_Child Process Spawned via Diskshadow Detected
- LP_Code Execution Via Diskshadow Detected
- LP_Process Pattern Match For CVE-2021-40444 Exploitation
- Suspicious Extexport Execution Detected
- LP_Proxy Execution via Workfolders
- Proxy Execution via Windows Update Client
- Suspicious DLL Execution Using Windows Address Book
- LP_Suspicious Use of Dotnet Detected
- Execution of Arbitrary Executable Using Stordiag
- Process Creation via Time Travel Tracer
- LP_Time Travel Debugging Utility DLL Loaded
- File Execution via Msdeploy
- CVE-2022-40684 Exploitation Detected
- Possible Proxy Execution of Malicious Code
- LP_Suspicious Usage of BitLocker Management Script
- Proxy Execution of Payloads via Microsoft Signed Script
- Execution of Windows Defender Offline Shell from Suspicious Folder
- DLL Loaded Via AccCheckConsole
- LP_Proxy DLL Execution via UtilityFunctions
- Suspicious Usage of Squirrel Binary
- LP_Suspicious File Share Permission
- LP_Legitimate Application Dropping Script File
- LP_Default Possible Non-PCI Compliant Inbound Network Traffic Detected
- LP_High Severity EPP Alert
- LP_Medium Severity EPP Alert
- LP_Proxy Execution via Appvlp
- LP_Suspicious Extexport Execution Detected
- LP_Suspicious Usage of Squirrel Binary
- LP_Threat Intel Connections with Suspicious Domains