Rules: Internal Port Scan
This rule detects port scanning activity from one internal IP address to another, possibly indicating an attacker enumerating the network for lateral movement.
Detail | Value |
---|---|
Type | Threshold |
Category | Discovery |
Apply Risk to Entities | srcDevice_ip, srcDevice_hostname, user_username |
Signal Name | Internal Port Scan |
Summary Expression | Internal port scan from IP: {{srcDevice_ip}} |
Threshold Count | 20 |
Threshold Window | 5m |
Score/Severity | Static: 1 |
Enabled by Default | False |
Prototype | False |
Tags | _mitreAttackTactic:TA0043, _mitreAttackTechnique:T1595, _mitreAttackTechnique:T1046, _mitreAttackTechnique:T1595.001 |
- CheckPoint - Firewall and VPN
- CheckPoint - SmartDefense
- CheckPoint - URL Filtering
- Cisco Systems - ASA
- Cisco Systems - Firepower
- Cisco Systems - Meraki
- CrowdStrike - FDR
- Dell - Firewall
- Google - Google Cloud Platform
- IBM - Guardium
- Linux - Linux OS Syslog
- Microsoft - Windows
- Palo Alto Networks - Next Generation Firewall
- Sophos - UTM 9
- Zscaler - Firewall
Origin | Field |
---|---|
Normalized Schema | dstDevice_ip_isInternal |
Normalized Schema | dstPort |
Normalized Schema | listMatches |
Normalized Schema | objectType |
Normalized Schema | srcDevice_hostname |
Normalized Schema | srcDevice_ip |
Normalized Schema | srcDevice_ip_isInternal |
Normalized Schema | user_username |