Notification Categories
NDR notifications provide alerts about suspicious or potentially malicious activity within your network. To respond effectively, review each notification’s details and implement the recommended mitigation steps.
Each notification category includes the following details:
Severity: The assigned risk level (Low, Medium, or High). Higher severity means greater impact and requires immediate action.
Reason: The condition or behavior that triggered the alert.
Investigation: A step-by-step process to determine whether the activity is legitimate or malicious.
Mitigation: Recommended actions to contain or resolve the issue.
Address Scan Detected
Severity: High
Reason A device attempted to connect to multiple IP addresses on a specific port within the internal network. The scanned port is listed in the notification details.
Investigation
Verify whether the device is expected to perform internal scans, such as a vulnerability scanner or an administrator workstation.
Contact the device user to confirm whether the scan was intentional and authorized.
If the activity is malicious, identify which tools performed the scan and determine how they were installed on the system.
Mitigation
Monitor the device for scanning tools.
If scanning is unauthorized, isolate the device from the network.
Remove any malicious software identified on the device.
Anomaly - Data Transfer
Severity: Variable (depends on anomaly score)
Reason An interaction between endpoints transferred an unusually large volume of data.
Investigation
Review the endpoints and traffic type involved in the transfer.
Determine whether the transfer is consistent with business activity or if it could indicate malicious activity.
If suspicious, search notifications and metadata for related activity from the originating host.
Mitigation
Benign:
If many false positives occur, adjust the anomaly sensitivity from Settings >> Dyadic Anomaly Event Sensitivity.
Malicious:
Disconnect the affected machine from the internet.
Initiate incident response procedures.
Anomaly - Out of Hours
Severity: Variable (depends on anomaly score)
Reason Endpoints communicated outside of standard working hours.
Investigation
Identify the type of action performed and review the endpoints involved.
Verify whether the timing of the activity aligns with user behavior or business needs.
If suspicious, search notifications and metadata for related activity from the originating host.
Mitigation
Benign:
If many false positives occur, adjust the anomaly sensitivity from Settings >> Dyadic Anomaly Event Sensitivity.
Malicious:
Disconnect the affected machine from the internet.
Initiate incident response procedures.
Anomaly - Unexpected Interaction
Severity: Variable (depends on anomaly score)
Reason Endpoints communicated that had not previously interacted.
Investigation
Review the endpoints and traffic type involved.
Determine whether the activity is expected or consistent with business needs.
If suspicious, search notifications and metadata for signs of attacks involving either endpoint.
Mitigation
Benign:
If many false positives occur, adjust the anomaly sensitivity from Settings >> Dyadic Anomaly Event Sensitivity.
Malicious:
Disconnect the affected machine from the internet.
Initiate incident response procedures.
Anomaly - Unexpected Port
Severity: Variable (depends on anomaly score)
Reason Endpoints communicated using a port not previously used.
Investigation
Review the endpoints and traffic type involved.
Verify whether the port usage is legitimate or expected.
If suspicious, search notifications and metadata for signs of attacks involving either endpoint.
Mitigation
Benign:
If many false positives occur, adjust the anomaly sensitivity from Settings >> Dyadic Anomaly Event Sensitivity.
Malicious:
Disconnect the affected machine from the internet.
Initiate incident response procedures.
Anomaly - Unexpected Service
Severity: Variable (depends on anomaly score)
Reason Endpoints communicated using a service not previously used.
Investigation
Review the endpoints and traffic type involved.
Verify whether the service usage is legitimate or expected.
If suspicious, search notifications and metadata for signs of attacks involving either endpoint.
Mitigation
Benign:
If many false positives occur, adjust the anomaly sensitivity from Settings >> Dyadic Anomaly Event Sensitivity.
Malicious:
Disconnect the affected machine from the internet.
Initiate incident response procedures.
Anomaly - Unexpected Service and Port
Severity: Variable (depends on anomaly score)
Reason Endpoints communicated using a service and port combination not previously used.
Investigation
Review the endpoints and traffic type involved.
Verify whether the activity is legitimate or expected.
If suspicious, search notifications and metadata for signs of attacks involving either endpoint.
Mitigation
Benign:
If many false positives occur, adjust the anomaly sensitivity from Settings >> Dyadic Anomaly Event Sensitivity.
Malicious:
Disconnect the affected machine from the internet.
Initiate incident response procedures.
Anomaly - Unusual Context
Severity: Variable (depends on anomaly score)
Reason Endpoints communicated under unusual circumstances. Details of the context are provided in the notification.
Investigation
Review the endpoints and traffic type involved.
Determine whether the unusual context aligns with legitimate business behavior.
If suspicious, search notifications and metadata for related malicious activity.
Mitigation
Benign:
If many false positives occur, adjust the anomaly sensitivity from Settings >> Dyadic Anomaly Event Sensitivity.
Malicious:
Disconnect the affected machine from the internet.
Initiate incident response procedures.
ARP Scan Detected
Severity: High
Reason A host broadcasted a large number of ARP requests on the internal network in a suspicious manner.
Investigation
Verify whether the host is expected to perform intensive ARP requests.
Consider that ARP scans are often used by attackers as a stealthy enumeration technique.
Review raw data in packet captures (PCAPs) since automatically extracted ARP PCAPs may be unreliable.
Mitigation
Benign:
Whitelist the host as narrowly as possible.
Malicious:
Disconnect the host from the network.
Investigate the host for malware, trojans, rootkits, or unauthorized services.
BitTorrent Port Usage
Severity: Low
Reason A host transferred files using ports associated with BitTorrent traffic. This activity is generally unwanted because BitTorrent is commonly used for unauthorized file sharing.
Investigation
Review the remote IP addresses or domains involved.
Confirm whether the traffic was correctly flagged as BitTorrent.
Mitigation
Prevent the installation or use of BitTorrent clients on workstations.
Block known BitTorrent ports in the firewall.
Blacklist Match Certificate
Severity: Medium
Reason A certificate used in an SSL connection is associated with known malicious activity.
Investigation
Gather more information about the certificate to check its legitimacy.
Review the data attached to the notification or search metadata for details on the connection and other connections made by the host.
Check for additional suspicious activity involving the same host.
Mitigation
Benign
Whitelist the certificate as narrowly as possible, using the certificate hash to avoid false positives.
Malicious
Disconnect the infected machine from the network.
Enable Muninn AI Prevent for this notification type to automatically block future connections.
Initiate incident response procedures.
Blacklist Match Domain
Severity: Medium
Reason A host made a DNS request for a known malicious domain. This activity may indicate that the host is infected and attempting to communicate with a command-and-control server or download malware.
Investigation
Analyze the domain using tools such as VirusTotal.
Perform a full antivirus scan on the host to detect and remove malware.
Search notifications and metadata for related suspicious activity from the same host.
Mitigation
Benign
Whitelist the domain as narrowly as possible.
Malicious
Block the domain in the firewall.
Blacklist Match File
Severity: High
Reason A file matching a known malicious hash or filename was transferred over the network.
Investigation
Perform a full antivirus scan on the source host.
Investigate the file being transferred and review both endpoints.
If one endpoint is external, gather details on the domain and its activity.
Mitigation
Benign
Whitelist the file hash or name as narrowly as possible.
Malicious
Investigate the malware using tools such as VirusTotal.
Review other notifications from the host to determine if other devices are infected.
If linked to an advanced persistent threat, initiate incident response.
Blacklist Match IP Inbound
Severity: Low
Reason
The source IP of an inbound connection is malicious.
Investigation
Gather details on the IP address.
Review notification data or metadata to assess legitimacy.
Search for other suspicious activity involving the same host.
Mitigation
Benign
Whitelist the IP address as narrowly as possible.
Malicious
Disconnect the infected device from the network.
Enable Muninn AI Prevent to block future malicious connections.
Initiate incident response.
Blacklist Match IP Outbound
Severity: Medium
Reason
The destination IP of an outbound connection is malicious.
Investigation
Gather details on the IP address.
Review notification data or metadata to assess legitimacy.
Search for other suspicious activity involving the same host.
Mitigation
Benign
Whitelist the IP address as narrowly as possible.
Malicious
Disconnect the infected device from the network.
Enable Muninn AI Prevent to block future malicious connections.
Initiate incident response.
Blacklist Match SSH
Severity: High
Reason The SSH host key of a server is associated with malicious activity.
Investigation
Gather information about the SSH host key.
Investigate the IP address of the offending host.
Review metadata for related suspicious activity.
Search for other suspicious activity involving the same host.
Mitigation
Benign
Whitelist the SSH host key as narrowly as possible.
Malicious
Disconnect the infected machine from the network.
Enable Muninn AI Prevent for this notification type.
Initiate incident response.
Cleartext Protocol HTTP
Severity: Low
Reason An endpoint exchanged sensitive information, including credentials and authetication tokens, over HTTP on TCP port 80. Since HTTP transmits data in cleartext, this information is vulnerable to leakage.
Investigation
Identify the source and destination hosts involved in the HTTP session.
Investigate the external endpoint receiving the traffic.
Analyze metadata or raw traffic for cleartext credentials and other sensitive data.
Verify whether endpoints are using legacy operating system or applications that rely on HTTP.
Mitigation
Migrate endpoints to HTTPS, HTTP/2, or HTTP/3 using TLS encryption.
Isolate legacy systems that depend on HTTP into a management VLAN.
Configure servers to redirect HTTP requests to HTTPS.
Block outbound HTTP on port 80 unless required.
Use proxy servers to control and analyze HTTP traffic.
Restrict access to verified administrators through ACLs.
Cleartext Protocol SMBv1
Severity: High
Reason A system is using Server Message Block version 1(SMBv1) to share files. SMBv1 lacks encryption and modern signing, making it vulnerable to attacks including credential replay and EternalBlue exploitation.
Investigation
Identify the source and destination hosts involved in the SMBv1 session.
Review the operating system version of the host using SMBv1.
Analyze packet captures (PCAPs) for file-transfer paths and share names.
Investigate the files transferred during the session.
Check for related EternalBlue exploitation attempts.
Mitigation
Disable SMBv1 on all systems.
Migrate to SMBv3 with NTLMv2 and SMB signing.
Segment or isolate legacy systems that require SMBv1.
Apply Microsoft security updates (MS17-010 and later).
Block anonymous shares through Group Policy Object (GPO).
Cleartext Protocol Telnet
Severity: Medium
Reason An endpoint used the Telnet protocol on TCP port 23 to log in to another system. Telnet transmits data, including credentials and other sensitive information, in cleartext, leaving it vulnerable to interception.
Investigation
Identify the source and destination hosts involved in the Telnet session.
Analyze traffic on TCP port 23.
Review logs to confirm whether sensitive data was transmitted.
Verify whether the host is a legacy system or embedded device that still relies on Telnet.
Mitigation
Disable Telnet.
Use SSH as a secure alternative.
Isolate legacy systems that require Telnet into a management VLAN.
Restrict Telnet access to verified administrators only through Access Control Lists (ACLs).
Block TCP port 23 at network firewalls.
Cloud File Sharing Usage
Severity: Low
Reason A host attempted to connect to a domain associated with online file-sharing services including Google Drive, Dropbox, Box, iCloud, MediaFire, or mega.nz.
Investigation
Use metadata search to review the amount of data transferred and number of DNS requests.
Determine whether use of the service complies with company policy.
Mitigation
If policy compliant, whitelist the service for authorized hosts.
If policy violation, block traffic to file-sharing domains in the firewall.
Crypto Currencies Mining Pool Activity
Severity: Medium
Reason A host made a DNS request that matches a known cryptocurrency mining pool.
Investigation
Review metadata to determine whether the activity indicates mining.
Mitigation
Benign
Whitelist the request as narrowly as possible.
Malicious
Initiate incident response.
Enable Muninn AI Prevent to block future mining activity.
DarkNet or Tor Activity
Severity: High
Reason Certificates resembling Tor certificates were detected. Tor usage is generally unwanted as it conceals network activity, which may indicate data exfiltration or malicious activity.
Investigation
Investigate the remote hosts to verify whether they are Tor relays.
Mitigation
Benign
Whitelist the traffic as narrowly as possible.
Malicious
Confirm with the user whether they are aware of Tor usage.
If unauthorized, investigate for breaches and initiate incident response.
DICOM Presentation Data
Severity: Low
Reason A DICOM message of type P-DATA containing presentation data was detected. The message may be unencrypted.
Investigation
Analyze the DICOM traffic.
Verify whether encryption is in use.
Mitigation
Whitelist the traffic as narrowly as possible.
Verify that the host is authorized to access the data.
Use a secure protocol to prevent plaintext communication.
DNS Multiple Domain Not Found
Severity: Low
Reason A host received multiple “Domain not found” responses for unique domains within a short time frame. This behavior may indicate command-and-control activity.
Investigation
Review the queried domain names.
Investigate suspicious or unknown domains.
Mitigation
Benign
Whitelist the traffic as narrowly as possible.
Malicious
Disconnect the infected device from the network.
Disable the malware generating the queries.
Enable Muninn AI Prevent for this notification type.
Initiate incident response.
DNS over HTTPS (DOH) Usage
Severity: Low
Reason A host used DoH to get DNS answers. DoH can be abused by malware to conceal communications.
Investigation
If DoH is unexpected, identify which process generated the traffic.
Determine whether the usage is malicious.
Mitigation
Increase notification severity to High.
Block known DoH providers in proxies and DNS filters.
DNS Tunneling
Severity: High
Reason Multiple large DNS queries or responses with large payloads were detected. This may indicate DNS tunneling.
Investigation
Review the DNS queries.
Investigate unknown or suspicious domains.
Mitigation
Benign
Whitelist the traffic as narrowly as possible.
Malicious
Disconnect the infected device from the network.
Disable the malware generating the queries.
Enable Muninn AI Prevent for this notification type.
Initiate incident response.
DoublePulsar Backdoor Implant
Severity: High
Reason A host using SMBv1 changed its Multiplex ID (MID) to values between 81 and 83, which is a signature of the DoublePulsar backdoor. This typically follows an EternalBlue exploit.
Investigation
Identify the IP address of the affected host.
Confirm MID values of 81–83 in session metadata.
Verify SMB dialect is NT LM 0.12.
Review packet captures for EternalBlue-related opcodes.
Check SIEM logs for signs of lateral movement.
Perform live memory forensics if possible.
Inspect for other signs of compromise and registry artifacts linked to DoublePulsar.
Mitigation
Quarantine or isolate affected hosts.
Disable SMBv1 across all systems.
Upgrade to SMBv3 and enforce signing and encryption.
Apply Microsoft’s MS17-010 security update.
Reset all credentials used on the compromised host.
EternalBlue SMBv1 Exploit Attempt
Severity: High
Reason A host attempted SMBv1 traffic, SMB_COM_TRANSACTION2_SECONDARY request interleaved with SMB_COM_NT_TRANSACT command, consistent with the EternalBlue exploit (CVE-2017-0144), which allows remote code execution without valid credentials.
Investigation
Identify the source and destination hosts involved in the SMBv1 session.
Verify whether SMBv1 is enabled on the destination host.
Review packet data for invalid SMB packets.
Inspect endpoint antivirus or EDR logs for exploitation activity.
Mitigation
Disable SMBv1 across all systems.
Apply Microsoft’s MS17-010 patch.
Isolate the compromised host.
Segment the network to reduce exposure.
EternalChampion SMBv1 Exploit Attempt
Severity: High
Reason A host sent a rare sequence of SMBv1 commands, including SMB_COM_NT_TRANSACT with the subcommands NT_TRANSACT_RENAME and SMB_COM_NT_TRANSACT_SECONDARY, associated with the EternalChampion exploit, which attempts remote code execution by corrupting memory.
Investigation
Identify the source host and verify its operating system and patch status.
Investigate the use of unusual SMB subcommands including NT_TRANSACT_RENAME and SMB_COM_NT_TRANSACT_SECONDARY.
Check event logs for signs of memory violations or crashes.
Look for evidence of lateral movement or worm-like activity.
Mitigation
Disable SMBv1 unless strictly required.
Apply Microsoft’s MS17-010 patch.
Monitor for SMB subcommands including NT_TRANSACT_RENAME and SMB_COM_NT_TRANSACT_SECONDARY.
Use security tools to detect SMB exploitation techniques.
If exploitation is confirmed, perform incident response and threat hunting across the network.
EternalSynergy SMBv1 Exploit Attempt
Severity: High
Reason A host sent SMBv1 traffic consistent with EternalSynergy or EternalRomance exploits, including SMB_COM_WRITE_ANDX command interleaved with another SMB command, which manipulate system memory to execute code remotely without authentication.
Investigation
Identify the source host that initiated the SMBv1 traffic.
Inspect raw network data and SMB logs.
Mitigation
Disable SMBv1 on all systems.
Apply Microsoft’s MS17-010 security update.
Use intrusion prevention systems or endpoint detection tools to detect eternal exploit behavior.
Isolate the host and perform memory and disk forensics.
Enforce SMBv2 or SMBv3 usage policies.
Event Log Clearing using RPC
Severity: Medium
Reason A host sent a remote procedure call that may have cleared event logs or forced a reboot to conceal malicious activity.
Investigation
Verify whether the host is a domain controller or administrator workstation.
Review metadata for additional traffic to or from the host.
Determine whether the behavior is legitimate or malicious.
Mitigation
Benign
Whitelist the behavior as narrowly as possible.
Malicious
Verify that Muninn AI Prevent is blocking further attempts.
Enable or adjust blocking if necessary.
Initiate incident response.
Exfiltration of many files
Severity: Medium
Reason A host transferred an unusually large number of files from the internal network in a suspicious manner.
Investigation
Examine the nature of the file transfer.
Assess whether the contents of the files and the transfer were business-related.
Mitigation
Benign
Whitelist the host as narrowly as possible.
Restrict file access if possible.
Malicious
Investigate the host for malware, trojans, rootkits, or unauthorized services.
Expired SSL Certificate from External Server
Severity: Low
Reason An external server presented an expired SSL certificate.
Investigation
Confirm that the certificate is invalid.
Determine whether the server is under your control.
If not, check metadata to ensure the notification relates to a legitimate domain.
Mitigation
Internal Services
Implement a process to log certificate expiration dates.
Automate certificate renewal, for example, using ACME.
Enable Muninn notifications for certificates nearing expiration.
External Services
If the site is legitimate, block the domain temporarily and notify the site owner.
If the site is malicious, block the domain permanently and enable Muninn AI Prevent.
Expired SSL Certificate from Internal Server
Severity: Medium
Description An internal server presented an expired SSL or TLS certificate.
Investigation
Confirm whether the notification is linked to a legitimate internal server.
If the server is unknown, investigate for potential rogue activity.
Mitigation
Benign
Implement a process to log certificate expiration dates.
Automate certificate renewal.
Enable Muninn notifications for certificates nearing expiration.
Malicious
Initiate incident response.
External DNS Server
Severity: Low
Reason A host queried a DNS server outside the local network. This may indicate an attempt to bypass monitoring or restrictions.
Investigation
Confirm whether the query was intended for a legitimate internal DNS server.
If strict DNS policies exist, investigate the host for other unusual notifications or requests.
Mitigation
Block external DNS requests in the firewall for all non-DNS servers.
Enforce internal DNS usage on all workstations.
Whitelist validated internal DNS servers.
Whitelist specific external DNS servers if allowed by policy.
External IMAP Email Server
Severity: Medium
Reason A host connected to an external IMAP email server. Some malware uses IMAP to communicate with adversary-controlled servers.
Investigation
Verify whether the host normally connects to external IMAP servers.
Review notifications or metadata for related suspicious activity.
Mitigation
Benign
Enforce internal IMAP server usage.
Whitelist the external server if approved or allowed under policy.
Malicious
Perform a full antivirus scan on the host.
External POP3 Email Server
Severity: Low
Reason A host connected to an external POP3 email server. Some malware uses POP3 for adversary-controlled communication.
Investigation
Verify whether the host normally connects to external POP3 servers.
Review notifications or metadata for related suspicious activity.
Mitigation
Benign
Enforce internal POP3 server usage.
Whitelist the external server if approved or allowed under policy.
Malicious
Perform a full antivirus scan on the host.
External SMTP Email Server
Severity: Medium
Reason A host connected to an external SMTP email server. Some malware uses SMTP for data exfiltration or command-and-control activity.
Investigation
Verify whether the host normally uses SMTP.
Review notifications or metadata for suspicious traffic.
Investigate the remote host to determine whether it is malicious.
Mitigation
Benign
Enforce internal SMTP server usage.
Whitelist external SMTP servers if approved by policy.
Malicious
Block outbound SMTP for all non-SMTP servers.
Investigate SMTP traffic.
Perform a full antivirus scan on the host.
Review other notifications for possible malware spread.
Failed login attempt from an unprecedented country
Severity: Low
Reason A failed login attempt was detected from a country where the user has no previous login history.
Investigation
Verify whether the attempt was expected.
Check with the user about recent travel or remote access.
Mitigation
If suspicious, block further login attempts.
Reset the affected account password.
Initiate incident response if unauthorized access is suspected.
FTP Brute Force Login
Severity: High
Reason An FTP server received a large number of failed login attempts within a short period from the same source.
Investigation
Review usernames used in the attempts.
Confirm whether a misconfiguration is responsible.
Investigate the source IP or device.
Mitigation
Limit login attempts from a single source.
Restrict FTP access to specific IP addresses.
Verify that sensitive data is not being transferred over FTP, since it is unencrypted.
FTP Plaintext Credentials
Severity: Medium
Reason An endpoint transmitted FTP credentials in plaintext. FTP transmits both data and credentials without encryption.
Investigation
Review usernames and passwords sent in plaintext.
Investigate the source device or IP address.
Mitigation
Use SFTP or FTPS instead of FTP.
Restrict FTP server access to specific IP addresses
Ensure confidential data is not transferred over FTP.
FTP Site Execute Detected
Severity: High
Reason A successful response to an FTP SITE EXEC command was detected. This command allows execution of server-side commands.
Investigation
Identify which command or executable was run.
Verify whether the execution was expected.
Mitigation
Disable SITE EXEC functionality on the FTP server.
Global Address Scan
Severity: High
Reason A host attempted to connect to multiple IP addresses on a specific port outside the internal network.
Investigation
Verify whether the host is expected to perform scans, including a vulnerability scanner.
Confirm with the user whether the scan was intentional.
Identify which tools performed the scan and how they were installed.
Check for misconfigurations.
Review notifications and metadata for related suspicious activity.
Investigate the remote IP or domain for known malicious associations.
Mitigation
Benign
Whitelist the host as narrowly as possible.
Malicious
Monitor for scanning tools on the device.
Global Port Scan
Severity: High
Reason A host attempted to connect to multiple ports on a remote internet host.
Investigation
Verify whether the host is expected to perform scans.
Confirm with the user whether the scan was intentional.
Identify which tools performed the scan and how they were installed.
Check for misconfigurations.
Review notifications and metadata for related suspicious activity.
Investigate the remote IP or domain for known malicious associations.
Mitigation
Benign
Whitelist the host as narrowly as possible.
Malicious
Monitor for scanning tools on the device.
HL7 plaintext Patient Identification
Severity: Medium
Reason A plaintext HL7 message containing a patient identification segment (PID) was detected.
Investigation
Review the HL7 traffic.
Assess whether sensitive data was exposed.
Mitigation
Whitelist the traffic as narrowly as possible.
Verify that the host is authorized to access the data.
Use a secure protocol to prevent plaintext communication.
HTTP Authentication Brute Force
Severity: High
Reason A host made frequent failed authentication attempts using different username and password combinations over HTTP.
Investigation
Search HTTP traffic metadata for usernames used.
Determine whether the activity was benign or malicious.
Mitigation
Identify the software responsible for the attempts.
Correct the issue to prevent further attempts.
HTTP crawler detected
Severity: High
Reason A host made multiple requests for the robots.txt file or generated excessive HTTP GET requests, indicating crawling activity.
Investigation
If the crawler is internal, identify the software responsible.
If external, review the IP reputation.
Mitigation
Remove unauthorized crawling software.
Block external crawlers at the firewall.
HTTP SQL injection detected
Severity: High
Reason Multiple SQL injection attempts were detected against a server.
Investigation
Confirm whether the requests are valid SQL injection attempts.
Determine whether any requests received a valid response (HTTP code 200).
Check for other connections from the attacking IP.
Mitigation
Conduct a full web application security assessment.
Patch or update vulnerable applications.
Deploy a web application firewall to block SQL injection attempts.
Block the attacking IP if not associated with a trusted hosting provider.
HTTP SQL injection victim detected
Severity: High
Description A server responded successfully to one or more SQL injection attempts, indicating that the application may be vulnerable.
Investigation
Confirm whether the requests are valid SQL injection attempts.
Determine whether any requests received a valid response (HTTP code 200).
Check for other connections from the attacking IP.
Mitigation
Conduct a full web application security assessment.
Patch or update vulnerable applications.
Deploy a web application firewall to block SQL injection attempts.
Block the attacking IP if not associated with a trusted hosting provider.
Impossible Travel Detected
Severity: Medium
Reason A user logged in to an MS365 account from two locations that are geographically too far apart for the given timespan. This may indicate a credential breach, but it could also be caused by legitimate VPN or proxy usage.
Investigation
Review login timestamps, IP addresses, and geolocation data.
Verify with the user their physical locations at the times of login.
Check whether VPN or proxy connections were used.
Check for other suspicious logins using the same account.
Mitigation
Benign
Confirm the login activity with the user to verify it is legitimate.
Document the verification and ensure no further action is needed.
Adjust the impossible travel policy thresholds if needed to reduce unnecessary alerts.
Malicious
Suspend the user account, mark the account as compromised, and reset the password.
Invalid SSL Certificate from External Server
Severity: Medium
Reason A certificate from an external server could not be validated. The notification provides details on why the certificate is considered invalid.
Investigation
Identify why the certificate was invalid.
Determine which external server presented the invalid certificate.
Gather more details on the traffic flowing to the server by reviewing metadata.
Verify that the localhost did not connect to a malicious domain, as few legitimate servers provide invalid SSL certificates.
Mitigation
If the server is company-owned and uses a certificate issued by your internal root CA, whitelist this notification category for that server.
Ensure the whitelist includes both the reason the certificate is not valid and the CommonName of valid certificates.
If the external service is malicious, block it in the firewall and consider enabling automated prevention.
Invalid SSL Certificate from Internal Server
Severity: Low
Reason A certificate from an internal server could not be validated. The notification provides details on why the certificate is considered invalid.
Investigation
Identify why the certificate was invalid.
Determine which internal service presented the invalid certificate by reviewing Logpoint NDR’s asset table.
Collect more details on the server traffic using metadata search.
Mitigation
If you are using your own root CA not trusted by Logpoint NDR, whitelist this category for relevant hosts.
When whitelisting, specify the reason the certificate is not valid and the CommonName of valid certificates.
Kerberoasting TGS Tickets
Severity: Medium
Reason A host attempted to harvest Ticket Granting Service (TGS) tickets. Since part of the ticket is encrypted with keys derived from user passwords, the credentials could be cracked offline.
Investigation
Verify whether the host is expected to request TGS tickets.
Confirm the host configuration for automated tasks.
Investigate the host for backdoors, remote access trojans (RATs), or other malware.
Mitigation
Benign
Whitelist the host as narrowly as possible.
Adjust thresholds and timeframes for this notification.
Malicious
Use service account passwords longer than 25 characters.
Implement Managed Service Accounts to enforce automatic password changes and delegated SPN management.
Kerberos Failed Attempts
Severity: Medium
Reason Multiple failed Kerberos authentication requests were detected within a short period.
Investigation
Verify whether the failures are caused by configuration errors.
Determine whether the failures were generated by a legitimate user.
Search for additional suspicious activity from the same host.
Mitigation
Fix any configuration errors.
Ensure the affected host is publicly accessible only if necessary.
If the host must be publicly accessible, enforce strong security controls and whitelist the notification where applicable.
Kerberos User Enumeration
Severity: Medium
Reason A host attempted to enumerate valid users in Active Directory. This behavior often precedes brute force attacks or Kerberoasting.
Investigation
Verify whether the host is authorized to perform user enumeration.
Confirm whether the host is configured correctly for automated tasks.
Investigate the host for backdoors, remote access trojans (RATs), or malware.
Mitigation
Benign
Whitelist the host as narrowly as possible.
Malicious
Block the host’s network access.
Investigate the host for malware, trojans, or rootkits.
Large amount of data sent as e-mail attachment
Severity: Low
Reason A user sent an unusually large number of email attachments.
Investigation
Confirm with the user whether the email attachments are legitimate and expected.
Mitigation
Dismiss the notification if the behavior is benign.
Large amount of e-mails sent
Severity: Low
Reason A user sent a unusually large number of emails.
Investigation
Verify with the user whether this volume of email activity is expected.
Mitigation
Block email transmission if required.
Large amount of files downloaded
Severity: Low
Reason
A user downloaded an unusually high number of files.
Investigation
Verify that the user is authorized to download such a volume of files.
Mitigation
Dismiss the notification if the file downloads are legitimate.
Large amount of mail attachment sent
Severity: Low
Reason A user sent an unusually high number of email attachments. This may indicate data exfiltration.
Investigation
Check whether the attachments contain confidential information.
Verify whether the recipient is legitimate.
Mitigation
Dismiss the notification if the activity is benign.
Large transfer downloaded from external host
Severity: Low
Reason More than 300 MB was downloaded from an external host.
Investigation
Verify that the host is authorized to download from this external server.
Mitigation
Whitelist servers for which large downloads are acceptable.
Large transfer downloaded from internal host
Severity: Medium
Reason A substantial amount of data was downloaded from an internal host.
Investigation
Confirm that the host is authorized to download from this internal server.
Mitigation
Whitelist servers for which large downloads are acceptable.
Large transfer sent to external host
Severity: Medium
Reason A substantial amount of data was uploaded to an external host.
Investigation
Confirm that the host is authorized to upload data to this external server.
Review related metadata for protocol-specific details to better understand the transfer.
Mitigation
Whitelist servers for which large uploads are acceptable.
Large transfer sent to internal host
Severity: Low
Reason A substantial amount of data was uploaded to an internal host.
Investigation
Confirm that the host is authorized to upload data to this internal server.
Review related metadata for protocol-specific details to better understand the transfer.
Mitigation
Whitelist servers for which large uploads are acceptable.
Lateral Movement using SMB Admin Shares
Severity: Medium
Reason A host wrote a file to an SMB admin share, for example c$, admin$, or ipc$. These shares provide administrative access to Windows machines and may indicate lateral movement.
Investigation
Verify whether the source host is a domain controller or an IT administrator workstation.
Confirm that the write action was legitimate.
Mitigation
If the notification is triggered repeatedly by legitimate requests, whitelist this notification category for the specific source.
If it occurs only between a small set of host pairs, whitelist them individually to narrow the scope.
Local blacklisted executable detected
Severity: High
Reason A host executed a file that matches a known malicious executable.
Investigation
Confirm whether the host is authorized to execute the file.
Check the list of expected files and packages installed on the machine.
Investigate whether the host is infected with backdoors, remote access trojans (RATs), or other types of malware.
Mitigation
Benign
Allowlist as narrowly as possible, using patterns such as regex to specify exact files.
Malicious
Disconnect the host from the network.
Identify and remove the unauthorized or malicious software package.
Wipe the machine and reinstall a clean system image.
Login from unexpected country
Severity: Low
Reason A user logged in from a country that does not match their usual profile.
Investigation
Verify with the user whether the login was legitimate.
Mitigation
If the user does not confirm legitimacy, suspend the account.
Reset the password.
Identify the appropriate time to safely re-enable the account.
Login from unprecedented country
Severity: Low
Reason A user logged in from a country for the first time. This user has never previously logged in from this location.
Investigation
Confirm with the user whether the login was performed from that country.
Mitigation
Consider creating a user group for frequent travelers.
Import this group into Cloud App Security.
Exclude the group from this alert to reduce false positives.
Misconfigured HTTP basic auth client
Severity: Low
Reason A host generated multiple failed authentication attempts with the same username-password combination in a short period.
Investigation
Check if there is a misconfiguration on the client.
If multiple clients are connecting to the same server, verify whether the server is misconfigured.
Mitigation
Correct the misconfiguration.
New device detected
Severity: Medium
Reason A new device with a unique MAC or IP address was detected on the network. It does not match any previously recognized hosts and could indicate a potential threat in a static environment.
Investigation
Verify if the MAC or IP address exists in the organization’s asset inventory.
Inspect which systems the device communicates with and identify the ports or protocols used.
Mitigation
Isolate the unrecognized device if it does not belong to the inventory.
For environments with frequent dynamic changes (VMs, containers, or auto-scaling), consider placing them in separate VLANs or network segments to reduce noise.
Not yet valid SSL certificate from external server
Severity: Low
Reason An external server presented an SSL certificate that is not yet valid. This could be a misconfiguration, but visiting such sites poses a security risk.
Investigation
Review metadata associated with the notification to identify the affected traffic.
Investigate the domain name for signs of suspicious or malicious behavior.
Mitigation
If the site is legitimate but misconfigured, notify the domain owner to correct the issue.
If the site is malicious, block it in the firewall.
Not yet valid SSL certificate from internal server
Severity: Low
Reason An internal server presented an SSL certificate that is not yet valid. This may be due to misconfiguration or an attacker deploying a rogue web server.
Investigation
Verify when the server first appeared using the asset inventory.
Confirm that the server is legitimate.
Mitigation
If the server is legitimate but misconfigured, fix the certificate.
If the server is malicious, initiate incident response.
NTLM User Password Bruteforce
Severity: High
Reason A host made numerous unsuccessful NTLM authentication attempts in a short period. This could be a brute-force attack or a configuration error.
Investigation
Verify if the same username is being targeted repeatedly.
Check host configuration to determine if legitimate but incorrectly configured software is generating the failures.
Search for additional suspicious activity from the host.
Mitigation
Benign
Correct any configuration errors.
Malicious
Investigate the source of the brute-force attempts to determine if the network has been compromised.
Old SSL encryption version in use
Severity: Low
Reason A server is using an outdated or unsafe SSL version, which poses a security risk.
Investigation
Determine which server is using the outdated SSL version.
Confirm whether it is running legacy systems that cannot be upgraded.
Mitigation
Upgrade servers and clients to use TLS 1.2 or higher.
Disable insecure SSL protocols on all systems.
OT unknown function codes
Severity: Medium
Reason A host called undocumented or unknown function codes in an OT (Operational Technology) system.
Investigation
Investigate why the host is calling these functions.
Review the ladder source code for anomalies.
Mitigation
Disconnect the host from the network if possible.
Review and thoroughly test the source code before deploying to production.
OT write rate exceeded
Severity: Medium
Reason A host generated an unusually high number of write requests in an OT system.
Investigation
Investigate why the write rate was exceeded.
Check what registers were used and whether the ratio is appropriate.
Assess whether the record writing rate seems reasonable.
Mitigation
Disconnect the host from the network if possible.
Review and thoroughly test the source code before deploying to production.
P2P port usage
Severity: Low
Reason Peer-to-peer traffic is suspected because a host transferred files to ports commonly associated with P2P protocols other than BitTorrent. This traffic is often unwanted because it may involve copyright violations.
Investigation
Investigate the remote IP addresses or domains to confirm whether the traffic was correctly identified as P2P.
Mitigation
Prevent the use of P2P clients on workstations.
Block the associated ports in the firewall.
P2P traffic patterns
Severity: Low
Reason Peer-to-peer traffic is suspected because a host transferred large volumes of data across many simultaneous connections. This traffic is often unwanted because it may involve copyright violations.
Investigation
Investigate the remote IP addresses or domains to confirm whether the traffic was correctly identified as P2P.
Mitigation
Prevent the use of P2P clients on workstations.
Persistence using RPC
Severity: Medium.
Reason A Remote Procedure Call (RPC) associated with persistent access was executed. Examples include port monitors or DLLs used for remote access. Attackers may exploit these to maintain unauthorized access.
Investigation
Review the RPC endpoint and operation specified in the notification.
Check if the request originated from a domain controller or an IT administrator.
Determine whether legitimate domain policies could explain the activity.
Mitigation
If legitimate requests repeatedly trigger this notification, whitelist the specific source.
If activity occurs only between a few host pairs, whitelist them individually to narrow scope.
Point Anomaly
Severity: Variable (depends on anomaly score)
Reason A connection was flagged as anomalous due to an unusual combination of sent bytes, received bytes, and connection duration.
Investigation
Review the associated metadata to determine whether the behavior indicates malicious activity.
Mitigation
If too many benign alerts occur, lower the sensitivity of the Point Anomaly Event Sensitivity setting.
Port Scan Detected
Severity: High
Reason A host attempted to connect to multiple ports on a remote machine within the local network.
Investigation
Verify whether the host is authorized to perform scans, including a vulnerability scanner or administrator workstation.
Check for configuration errors on the machine.
Review notifications and metadata for other suspicious activity.
Mitigation
Mitigation
Benign
Whitelist the host as narrowly as possible.
Malicious
Disconnect the host from the network.
Initiate incident response.
Identify and remove the software responsible for the scans.
Possible DCSync Attack
Severity: High
Reason
A non-Domain Controller sent an RPC call drsuapi::DRSGetNCChanges to a trusted Domain Controller. This behavior suggests a DCSync attack, where attackers abuse replication protocols to extract NTLM password hashes and Kerberos keys.
Investigation
Identify the source IP that issued the RPC call and confirm it is not a whitelisted Domain Controller.
On the target Domain Controller, check Security Event ID 4662 for
DS-Replication-Get-Changesrights.Review Event IDs 4673 and 4742 for privileged service use or password resets.
Search EDR/SIEM logs for tools such as Mimikatz or Impacket.
Capture packet traces to confirm DRSGetNCChanges activity over TCP ports 135/445.
Mitigation
If the request is from a trusted Domain Controller, allowlist the activity.
Isolate the source host and disable the account used in the RPC bind.
Rotate the
krbtgtpassword twice to invalidate forged tickets.Remove replication rights from non-DC principals.
Enable LSA Protection or Credential Guard on Domain Controllers and tier-0 servers.
RDP brute force external to internal
Severity: Low
Reason An external host attempted multiple usernames or passwords to gain access to an internal computer via RDP. This may represent an initial access attempt by an attacker.
Investigation
Verify whether the host is authorized to access the remote service.
Check if the internal machine shows signs of infection by malware, RATs, or backdoors.
Mitigation
Disable RDP if not required.
Enforce strong password policies.
Limit the number of allowed password attempts.
RDP brute force internal to external
Severity: Medium
Reason An internal host attempted multiple usernames or passwords to connect to an external machine via RDP. This may indicate botnet activity or masquerading.
Investigation
Verify whether the host is authorized to access the external service.
Check if the host shows signs of malware or unauthorized remote tools.
Mitigation
Disable RDP if not required.
Enforce strong password policies.
Limit the number of allowed password attempts.
RDP brute force internal to internal
Severity: High
Reason An internal host attempted multiple usernames or passwords to connect to another internal host via RDP. This may indicate lateral movement by an attacker already inside the network.
Investigation
Verify whether the host is authorized to access the target system.
Check if the machine shows signs of malware, RATs, or backdoors.
Mitigation
Disable RDP if not required.
Enforce strong password policies.
Limit the number of allowed password attempts.
RDP Outgoing Connection
Severity: Low
Reason An RDP connection was established between an internal and an external host.
Investigation
Investigate the remote IP or domain to confirm whether the connection is legitimate.
Verify any unknown IPs or domains involved.
Mitigation
Benign
Whitelist as narrowly as possible.
Malicious
Disconnect the host from the network.
Identify and disable any malware responsible for the connection.
Consider enabling AI-based prevention to block similar activity in the future.
Initiate incident response.
Remote execution using RPC
Severity: High
Reason A Remote Procedure Call (RPC) associated with remote execution was detected. Attackers often use RPC for lateral movement or privilege escalation.
Investigation
Review the RPC endpoint and operation in the notification.
Verify whether the request came from a domain controller or IT administrator workstation.
Check whether legitimate administrative activity could explain this behavior.
Mitigation
If the notification recurs due to legitimate activity, allowlist the specific source.
For activity between a small set of host pairs, allowlist them individually to narrow the scope.
Reverse SSH
Severity: Medium
Reason A host established a reverse SSH tunnel to an external host, bypassing firewall.
Investigation
Validate whether the SSH connection is legitimate.
Review metadata to check for other malicious activities tied to the host.
Mitigation
Benign
Whitelist as narrowly as possible.
Malicious
Disable the malware or process establishing the tunnel.
Enable Muninn AI Prevent to cut off similar connections.
Initiate incident response procedures.
Secure com password guessing attempts detected
Severity: High
Reason A device made multiple unsuccessful SSH login attempts. These attempts were weighted by likelihood of failure, indicating brute force or misconfiguration.
Investigation
Check for configuration errors on the SSH client.
Determine if the attempts originate from a trusted or expected source.
Inspect if the source device has performed other suspicious actions.
Mitigation
Limit login attempts per source.
Restrict access to the SSH server to only necessary devices or IP addresses.
Enforce certificate-based authentication.
Disable root logins.
Selective Port Scan
Severity: High
Reason A host scanned for specific ports associated with exploitable services that may serve as attack vectors.
Investigation
Confirm whether the scan was initiated by an authorized administrator or tool.
Check if the host is authorized to perform port scans.
Investigate the host for malware, backdoors, or RATs.
Mitigation
Benign
Whitelist the host if the behavior is legitimate.
Malicious
Block the host’s network access.
Investigate for scanning tools or malicious software.
SMB Ransomware filename detected
Severity: High Reason A host wrote or renamed a file on an SMB share with an extension associated with ransomware.
Investigation
Review the filename in the notification description.
Attempt to open the file. If unreadable, it may have been encrypted by ransomware.
Mitigation:
Benign
Restore from backup if the file is incorrectly flagged.
Whitelist legitimate file extensions used in your environment.
Malicious
Initiate incident response.
SMB Sensitive File
Severity: Medium
Reason
A host accessed a file on an SMB share with a potentially sensitive name, for example password.txt.
Investigation
Confirm whether the file contains sensitive or confidential information.
Check if the accessing host is authorized to read the file.
Mitigation:
Move sensitive files to secure storage such as a password manager.
Whitelist host-file combinations if legitimate.
Whitelist the file path and server IP if non-sensitive.
SMB Suspicious File Renaming
Severity: High Reason Multiple files on an SMB share were renamed, written to, or deleted in a short time. This behavior often indicates ransomware attempting to encrypt shared files.
Investigation
Review the filenames and file changes to confirm whether malicious encryption is in progress.
Mitigation
Benign
If caused by an automated process, whitelist as narrowly as possible (for example, specific file names).
Malicious
Enable Muninn AI Prevent to block the activity.
Disconnect the affected machine from the network.
Initiate incident response.
SMBv1 protocol violation (NT_Rename)
Severity: Medium
Reason
A client issued an undefined NT_TRANSACT_RENAME request. This activity is linked to the EternalChampion exploit, which attempts to trigger memory corruption in the Windows kernel.
Investigation
Check if
NT_TRANSACT_SECONDARYpackets were sent immediately after theNT_TRANSACT_RENAMEcall.Review Windows Event Logs for kernel crash codes (for example, BugCheck 0x109 or 0x1E).
If the server crashed, analyze the full memory dump.
Confirm whether penetration testing tools were active at the time.
Mitigation
Quarantine the affected host.
Reset all potentially compromised credentials.
Disable SMBv1 and upgrade to SMBv3.
Enforce SMB signing and encryption on all servers.
Apply MS17-010 and other relevant Windows security patches.
SMBv1 protocol violation (PID/MID tampering)
Severity: Medium Reason A host using SMBv1 introduced an unknown Process ID (PID) or Multiplex ID (MID) in an active session. This violation may indicate covert channels or precursor traffic for exploits such as DoublePulsar.
Investigation
Validate anomalies in SMB headers.
Inspect the host for unsigned drivers.
Identify the device type (workstation, NAS, printer) and review firmware behavior.
Check for related Eternal-family exploit activity within ±5 minutes.
Review Windows Event Logs for anomalies.
Mitigation
Quarantine the host immediately.
Disable SMBv1 and upgrade to SMBv3.
Enforce SMB signing and encryption.
Apply the latest Windows security patches.
Reset all credentials associated with the compromised host.
SMBv1 protocol violation (TX2 command abuse)
Severity: Medium
Reason
A client sent an unsupported TRANSACTION2 sub-command. This pattern is linked to EternalSynergy/EternalRomance exploits or aggressive protocol fuzzing.
Investigation
Correlate the event with process activity on the client.
Review SMB activity leading up to the event for suspicious command chains (for example,
WRITE_ANDX).Inspect server Event Logs for crashes (Event ID 1000) or unexpected reboots (Event ID 6008).
Confirm whether a vulnerability scan or penetration test coincided with the detection.
Mitigation
Quarantine the affected host.
Disable SMBv1 and upgrade to SMBv3.
Enforce SMB signing and encryption.
Apply Windows security patches.
Add IPS/NGFW rules to block undefined SMB
Transaction2sub-commands.
SMBv1 protocol violation (unimplemented command)
Severity: Medium Reason A host sent an unused or reserved primary command code in SMBv1. Attackers and fuzzers use these opcodes to probe kernel vulnerabilities.
Investigation
Identify the client IP and active user account.
Inspect SMB traffic in Wireshark to analyze the command.
Check for suspicious
TRANS2/NT_TRANSACTsequences before the event.Investigate the client for tools such as Impacket or Cobalt Strike.
Review scheduled tasks and registry entries for persistence mechanisms.
Mitigation
Quarantine the host immediately.
Ensure outdated SMB drivers are not in use.
Disable SMBv1 and upgrade to SMBv3.
Enforce SMB signing and encryption.
Apply the latest Windows security patches.
Reset credentials cached on the host.
Soon to expire SSL certificate from external server
Severity: Low
Reason An external server presented an SSL certificate that is nearing expiration.
Investigation
Review metadata to identify the affected traffic.
Check whether the domain name is suspicious.
Mitigation
If the site is legitimate but misconfigured, notify the domain owner to renew the certificate.
If the site is malicious, block it in the firewall.
Soon to expire SSL certificate from internal server
Severity: Low
Reason An internal server presented an SSL certificate that will expire in 30 days.
Investigation
Identify the server presenting the certificate.
Verify whether the certificate is still valid and intended for use.
Mitigation
Renew the SSL certificate before it expires.
Implement a certificate management process to monitor and track expirations.
SSH External Connection
Severity: Low
Reason An inbound or outbound SSH connection was attempted between an internal and external host. The authentication result may be successful, unsuccessful, or unknown. “Unknown” means the connection closed before authentication or the response was not detected. Since SSH traffic is encrypted, authentication results are inferred.
Investigation
Verify whether this connection is expected and authorized.
Investigate the external host to determine if it is trusted or malicious.
Mitigation
Benign
Whitelist the connection as narrowly as possible.
Malicious
Identify and disable the software initiating the connection.
Consider enabling Muninn AI Prevent to automatically block the connection.
If the destination server is malicious, initiate incident response.
SSH Failed Attempts
Severity: High
Reason A host recorded repeated SSH login failures. The number of failed attempts compared to successful ones exceeded the threshold within a short period.
Investigation
Check for configuration errors.
Verify whether the attempts came from a legitimate user.
Look for other suspicious activity from the same host.
Mitigation
Fix any configuration issues.
Ensure the host is exposed to the internet only if required.
Restrict SSH access to specific IP addresses or ranges on the local network.
If the host must be publicly accessible, enforce strong security measures and whitelist this notification for that host.
SSH Interesting Hostname Login
Severity: Low
Reason A reverse DNS lookup showed that the source or destination hostname contains terms such as DNS, www, SMTP, POP, IMAP, or FTP. These names are usually tied to services and are not expected to perform manual actions like SSH logins.
Investigation
Verify whether the connection is legitimate.
Confirm that the destination host is intended to be accessible by SSH.
Mitigation
Restrict SSH access to only necessary devices or IP addresses.
Allow only SSH key–based logins.
Disable root login.
Telnet Brute Force Login Detected
Severity: Medium
Reason A host attempted multiple usernames or passwords to gain access to a system via Telnet. This may indicate an attacker trying to establish initial network access. Telnet is insecure because it transmits all data, including passwords, in plaintext.
Investigation
Review the usernames used in the login attempts.
Check for possible misconfigurations.
Confirm whether the host is authorized to access the Telnet service.
Inspect the host for backdoors, Remote Access Trojans (RATs), or other malware.
Mitigation
Discontinue Telnet, or ensure no confidential data is transmitted. Use SSH as a secure alternative.
Limit the number of login attempts from a single source.
Restrict Telnet access to only required devices or IP addresses.
Too many failed login attempts for user
Severity: Medium
Reason Multiple failed login attempts were detected for a user, which may indicate an attempt to compromise a user account.
Investigation
Verify that multi-factor authentication (MFA) is functioning correctly.
Check if a misconfigured application is repeatedly trying to connect with expired credentials.
Confirm whether the user recently changed their password and if outdated credentials are still in use across network shares.
Mitigation
Fix MFA configuration issues.
Renew expired credentials.
Investigate whether network latency is contributing to failed attempts.
Too Many Failed Login Attempts from IP
Severity: Medium
Reason An unusual number of failed login attempts were detected from a single IP address. This may indicate a brute force attack or misconfiguration.
Investigation
Check for configuration errors.
Verify whether the attempts came from a legitimate user.
Look for additional suspicious activity from the same host.
Mitigation
Correct any configuration errors.
If malicious, block the offending IP and investigate further.
Tor exit node connection
Severity: Low
Reason A host has communicated with an external Tor exit node, which could indicate unauthorized or illegal activity.
Investigation
Check the remote hosts to determine if they match known Tor relays.
Mitigation
Benign
Whitelist the connection as narrowly as possible if it is legitimate.
Malicious
Determine whether the user of the machine is aware of Tor usage.
If the user is unaware, examine the machine for potential security breaches.
Tor middle node communication
Severity: Low
Reason A host has connected to a Tor middle node, indicating the user intends to maintain anonymity.
Investigation
Verify whether the host is indeed connecting to the Tor network.
Determine if there is a legitimate reason for using Tor.
Mitigation
Benign
Whitelist the connection as narrowly as possible if usage is legitimate.
Malicious
Investigate whether Tor usage is part of an unauthorized or non-user-initiated activity.
If the user is unaware of Tor usage, examine the machine for potential security breaches.
Traceroute Detected
Severity: Medium
Reason A host initiated a traceroute, a network diagnostic tool used to determine the path and round-trip times of connections. This activity is typically limited to system administrators.
Investigation
Confirm whether the host is expected to run traceroute.
If unexpected, investigate the traceroute destination to determine if it is a known server, IP, or domain.
Review metadata for other connections to the same destination.
Mitigation
Restrict traceroute on firewalls for both outbound and internal network segments, allowing exceptions only for validated users and devices.
Vulnerable external SSL connection
Severity: Low
Reason A host initiated a connection to an external server using an outdated SSL/TLS protocol (TLS 1.0 or any SSL version). These protocols are considered insecure.
Investigation
Identify the external server using the old encryption by reviewing metadata associated with this notification and checking SSL metadata for the host.
Use Logpoint NDR’s asset table to determine which software is present on the client, to target remediation effectively.
Mitigation
Ensure connections use TLS 1.2 or higher.
Harden systems and browsers to allow only secure ciphers.
Request support for modern encryption protocols from external services or consider switching to alternatives that use secure encryption.
Vulnerable internal SSL connection
Severity: Medium
Reason A host initiated a connection to an internal server using an outdated SSL/TLS protocol (TLS 1.0 or any SSL version). These protocols are considered insecure.
Investigation
Identify the internal service using the old encryption by reviewing metadata associated with this notification and checking SSL metadata for the host.
Use Logpoint NDR’s asset table to determine which software is present on the client, to target remediation effectively.
Mitigation
Ensure the server supports the latest TLS versions.
If all clients support it, enforce TLS 1.2 or higher on the server.
Harden systems and browsers to allow only secure ciphers.
Weak cipher for encryption
Severity: Medium
Reason A host initiated a connection using the RC4 cipher, which is considered insecure.
Investigation
Determine whether any software or malware is installed on either endpoint of the weakly encrypted connection.
Mitigation
Enforce TLS v1.2 or higher for all internal servers and workstations.
For frequently used external sites employing lower SSL/TLS versions, contact the webmaster to request an upgrade.
Weak key for encryption
Severity: Medium
Reason A host initiated a connection using a weak encryption key shorter than 2048 bits for non-elliptic curve ciphers.
Investigation
Determine whether any software or malware is installed on either endpoint of the weakly encrypted connection.
Mitigation
Enforce TLS v1.2 or higher for all internal servers and workstations.
For frequently used external sites employing lower SSL/TLS versions, contact the webmaster to request an upgrade.
Weak SNMP version detected
Severity: Medium
Reason A host communicated using an insecure SNMP protocol (v1 or v2c), which transmits data in clear text.
Investigation
Identify hosts supporting SNMP v1/v2c by reviewing metadata associated with this notification and SNMP metadata for the host.
Use Logpoint NDR’s asset table to determine which software is present on the client to target remediation effectively.
Mitigation
Disable SNMP v1/v2c in favor of SNMP v3.
If all clients support it, enforce SNMP v3 across the network.
Zerologon attempt
Severity: Medium
Reason A host initiated a high number of Netlogon attempts within a short period, indicating an attempt to exploit the Zerologon vulnerability CVE-2020-1472. This vulnerability allows an unauthenticated attacker to impersonate a domain controller and take control of the domain.
Investigation
Identify the host initiating the Netlogon attempts.
Inspect Windows Event logs for any signs of Zerologon-related activity, including Event IDs 5827, 5828, and 5829.
Mitigation
Isolate the host initiating the Netlogon requests.
Patch all domain controllers and servers with Microsoft’s fix for CVE-2020-1472 released in August 2020.
Audit domain controllers to prevent unauthorized changes.
Segment legacy systems and restrict access to a management VLAN using access control lists.
Zerologon Password Change
Severity: High
Reason A host initiated a high number of Netlogon login attempts and successfully changed the password on a domain controller, indicating full exploitation of the Zerologon vulnerability CVE-2020-1472.
Investigation
Identify the host initiating the Netlogon attempts.
Inspect Windows Event logs for password change events, including Event ID 4742.
Mitigation
Reset the account password on the affected domain controller through Active Directory.
Isolate the compromised host from the network.
Patch all domain controllers and servers with Microsoft’s fix for CVE-2020-1472.
Last updated
Was this helpful?