Skip to content

Latest commit

 

History

History
19 lines (17 loc) · 7.82 KB

ds_cisco_cisco_secure_endpoint.md

File metadata and controls

19 lines (17 loc) · 7.82 KB

Vendor: Cisco

Product: Cisco Secure Endpoint

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
30 11 7 1 13
Use-Case Activity Types(Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content
Compromised Credentials alert-trigger:success(security-alert)
cisco-secureendpoint-sk4-alert-trigger-success-executedmalware
cisco-secureendpoint-mix-alert-trigger-threatquarantined
cisco-secureendpoint-sk4-alert-trigger-success-failedtodelete
cisco-secureendpoint-mix-alert-trigger-success-threatdetected
cisco-secureendpoint-mix-alert-trigger-success-vulnerable
cisco-secureendpoint-mix-alert-trigger-success-quarantine
cisco-secureendpoint-sk4-alert-trigger-systemprocessprotection
cisco-secureendpoint-cef-alert-trigger-success-detected
cisco-secureendpoint-sk4-alert-trigger-success-criticalfaultraised
cisco-secureendpoint-sk4-alert-trigger-success-multipleinfectedfiles
cisco-secureendpoint-sk4-alert-trigger-success-policyupdatefailure
cisco-secureendpoint-sk4-alert-trigger-success-quarantinefailure
cisco-secureendpoint-sk4-alert-trigger-success-falsenegative
cisco-secureendpoint-sk4-alert-trigger-success-cloudioc
T1027 - Obfuscated Files or Information
T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
T1078 - Valid Accounts
T1133 - External Remote Services
T1190 - Exploit Public Fasing Application
  • 23 Rules
  • 9 Models
Lateral Movement alert-trigger:success(security-alert)
cisco-secureendpoint-sk4-alert-trigger-success-executedmalware
cisco-secureendpoint-mix-alert-trigger-threatquarantined
cisco-secureendpoint-sk4-alert-trigger-success-failedtodelete
cisco-secureendpoint-mix-alert-trigger-success-threatdetected
cisco-secureendpoint-mix-alert-trigger-success-vulnerable
cisco-secureendpoint-mix-alert-trigger-success-quarantine
cisco-secureendpoint-sk4-alert-trigger-systemprocessprotection
cisco-secureendpoint-cef-alert-trigger-success-detected
cisco-secureendpoint-sk4-alert-trigger-success-criticalfaultraised
cisco-secureendpoint-sk4-alert-trigger-success-multipleinfectedfiles
cisco-secureendpoint-sk4-alert-trigger-success-policyupdatefailure
cisco-secureendpoint-sk4-alert-trigger-success-quarantinefailure
cisco-secureendpoint-sk4-alert-trigger-success-falsenegative
cisco-secureendpoint-sk4-alert-trigger-success-cloudioc
T1027 - Obfuscated Files or Information
T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
  • 2 Rules
Next Page -->>

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

Exploit Public Fasing Application

External Remote Services

Valid Accounts

Valid Accounts

Exploitation for Privilege Escalation

Obfuscated Files or Information: Indicator Removal from Tools

Valid Accounts

Obfuscated Files or Information