Rules: Excessive Firewall Denies
This rule is designed to detect excessive firewall blocks within a shortened time frame. Customers will need to adjust the threshold of this rule to align with their environment's normal vs abnormal firewall traffic patterns.
Detail | Value |
---|---|
Type | Threshold |
Category | Discovery |
Apply Risk to Entities | srcDevice_ip |
Signal Name | Excessive Firewall Denies |
Summary Expression | Excessive firewall denies for source IP: {{srcDevice_ip}} |
Threshold Count | 100 |
Threshold Window | 5m |
Score/Severity | Static: 1 |
Enabled by Default | False |
Prototype | False |
Tags | _mitreAttackTactic:TA0007, _mitreAttackTechnique:T1046 |
- Akamai - SIEM
- Amazon AWS - VpcFlowLogs
- Amazon AWS - Web Application Firewall (WAF)
- CheckPoint - Application Control
- CheckPoint - Firewall and VPN
- CheckPoint - SmartDefense
- CheckPoint - URL Filtering
- Cisco Systems - ASA
- Cisco Systems - Meraki
- Cloudflare - Logpush
- Dell - Firewall
- Fortinet - Fortigate
- Google - Google Cloud Platform
- Microsoft - Azure
- Palo Alto Networks - Next Generation Firewall
- Sophos - UTM 9
- Zscaler - Firewall
Origin | Field |
---|---|
Normalized Schema | action |
Normalized Schema | objectType |
Normalized Schema | srcDevice_ip |