Rules: Potential Inbound VNC Traffic
Observes for successful TCP traffic to default VNC ports or explicit VNC/RFB traffic detected
Detail | Value |
---|---|
Type | Templated Match |
Category | Unknown/Other |
Apply Risk to Entities | dstDevice_hostname, dstDevice_ip |
Signal Name | Potential Inbound VNC Traffic |
Summary Expression | Potential VNC traffic detected to IP: {{dstDevice_ip}} Host: {{dstDevice_hostname}} |
Score/Severity | Static: 1 |
Enabled by Default | False |
Prototype | False |
Tags | _mitreAttackTactic:TA0008, _mitreAttackTechnique:T1021, _mitreAttackTechnique:T1021.005 |
- Amazon AWS - VpcFlowLogs
- CheckPoint - Firewall and VPN
- CheckPoint - SmartDefense
- Cisco Systems - ASA
- Cisco Systems - Meraki
- Fortinet - Fortigate
- Palo Alto Networks - Next Generation Firewall
- Sophos - UTM 9
Origin | Field |
---|---|
Normalized Schema | application |
Normalized Schema | dstDevice_hostname |
Normalized Schema | dstDevice_ip |
Normalized Schema | dstPort |
Normalized Schema | ipProtocol |
Normalized Schema | objectType |
Normalized Schema | srcDevice_ip_isInternal |
Normalized Schema | success |