Vendor: CatoNetworks Product: Cato Cloud Rules Models MITRE ATT&CK® TTPs Activity Types Parsers 144 70 39 4 7 Use-Case Activity Types (Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content Abnormal Authentication & Access vpn-logout:success (vpn-logout) ↳catonetwork-cc-json-vpn-logout-success-disconnected ↳catonetwork-cc-cef-vpn-logout-success-disconnect http-traffic:success (web-activity-allowed) ↳catonetwork-cc-cef-vpn-http-success-security ↳catonetworks-cc-json-vpn-http-success-sdp ↳catonetworks-cc-json-vpn-http-success-security ↳catonetworks-cc-json-vpn-http-success-monitor ↳catonetworks-cc-json-vpn-http-success-rbi http-session:fail (web-activity-denied) ↳catonetwork-cc-cef-vpn-http-success-security T1021 - Remote ServicesT1071 - Application Layer ProtocolT1071.001 - Application Layer Protocol: Web ProtocolsT1078 - Valid Accounts 19 Rules8 Models Account Manipulation vpn-logout:success (vpn-logout) ↳catonetwork-cc-json-vpn-logout-success-disconnected ↳catonetwork-cc-cef-vpn-logout-success-disconnect T1098 - Account ManipulationT1098.002 - Account Manipulation: Exchange Email Delegate PermissionsT1484 - Group Policy Modification 7 Rules7 Models Brute Force Attack vpn-logout:success (vpn-logout) ↳catonetwork-cc-json-vpn-logout-success-disconnected ↳catonetwork-cc-cef-vpn-logout-success-disconnect T1110 - Brute Force 1 Rules1 Models Data Access vpn-logout:success (vpn-logout) ↳catonetwork-cc-json-vpn-logout-success-disconnected ↳catonetwork-cc-cef-vpn-logout-success-disconnect T1110 - Brute Force 1 Rules1 Models Privilege Escalation vpn-logout:success (vpn-logout) ↳catonetwork-cc-json-vpn-logout-success-disconnected ↳catonetwork-cc-cef-vpn-logout-success-disconnect T1098 - Account ManipulationT1098.002 - Account Manipulation: Exchange Email Delegate PermissionsT1555 - Credentials from Password StoresT1555.005 - T1555.005 5 Rules5 Models Next Page -->> MITRE ATT&CK® Framework for Enterprise Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact Phishing: Spearphishing LinkExternal Remote ServicesValid AccountsDrive-by CompromiseExploit Public Fasing ApplicationPhishing User Execution External Remote ServicesValid AccountsAccount ManipulationAccount Manipulation: Exchange Email Delegate Permissions Valid AccountsGroup Policy Modification Group Policy ModificationObfuscated Files or Information: Indicator Removal from ToolsValid AccountsObfuscated Files or Information Brute ForceSteal or Forge Kerberos TicketsCredentials from Password StoresSteal or Forge Kerberos Tickets: Kerberoasting Remote ServicesInternal Spearphishing Web ServiceApplication Layer Protocol: Web ProtocolsDynamic ResolutionDynamic Resolution: Domain Generation AlgorithmsProxy: Multi-hop ProxyApplication Layer ProtocolProxy Exfiltration Over Alternative ProtocolExfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolExfiltration Over Physical Medium: Exfiltration over USBExfiltration Over C2 ChannelExfiltration Over Physical MediumExfiltration Over Web Service: Exfiltration to Cloud StorageExfiltration Over Web Service Resource Hijacking