Rules: Threat Intel - Matched File Hash
A record flagged a file hash from a threat intelligence match list
Detail | Value |
---|---|
Type | Match |
Category | Threat Intelligence |
Apply Risk to Entities | device_hostname, srcDevice_hostname, device_ip, device_natIp, srcDevice_ip, srcDevice_natIp, device_mac, srcDevice_mac, user_username, dns_replyIp |
Signal Name | Threat Intel - Matched File Hash |
Summary Expression | None |
Score/Severity | Static: 3 |
Enabled by Default | True |
Prototype | False |
Tags |
- Carbon Black - Cloud
- Carbon Black - Defense
- Cisco Systems - Advanced Malware Protection (AMP)
- Cisco Systems - Meraki
- Cisco Systems - Umbrella
- Cloudflare - Logpush
- CrowdStrike - FDR
- CrowdStrike - Falcon
- Cybereason - Endpoint Security
- Cylance - Protect
- Fortinet - Fortigate
- Microsoft - Azure
- Microsoft - Graph Security API
- Microsoft - Office 365
- Microsoft - Windows
- Netskope - Security Cloud
- Proofpoint - Proofpoint on Demand
- Proofpoint - Targeted Attack Protection
- Sophos - Central
- VMware - Carbon Black Cloud
Origin | Field |
---|---|
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | device_mac |
Normalized Schema | device_natIp |
Normalized Schema | dns_replyIp |
Normalized Schema | listMatches |
Normalized Schema | srcDevice_hostname |
Normalized Schema | srcDevice_ip |
Normalized Schema | srcDevice_mac |
Normalized Schema | srcDevice_natIp |
Normalized Schema | user_username |