Skip to content

Latest commit

 

History

History
22 lines (20 loc) · 5.9 KB

ds_entrust_entrust_identity_enterprise.md

File metadata and controls

22 lines (20 loc) · 5.9 KB

Vendor: Entrust

Product: Entrust Identity Enterprise

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
23 5 5 3 1
Use-Case Activity Types (Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content
Abnormal Authentication & Access user-lock:fail (account-lockout)
entrust-ie-str-user-delete-fail-islocked

endpoint-login:fail (authentication-failed)
entrust-ie-kv-endpoint-login-fail-authfail
entrust-ie-kv-endpoint-login-fail-authfailforuser

endpoint-login:success (authentication-successful)
entrust-ie-kv-endpoint-login-success-sucesssauth
T1078 - Valid Accounts
T1110 - Brute Force
T1133 - External Remote Services
  • 15 Rules
  • 4 Models
Brute Force Attack user-lock:fail (account-lockout)
entrust-ie-str-user-delete-fail-islocked
T1110 - Brute Force
  • 1 Rules
Compromised Credentials endpoint-login:success (authentication-successful)
entrust-ie-kv-endpoint-login-success-sucesssauth
T1078 - Valid Accounts
T1133 - External Remote Services
  • 7 Rules
  • 4 Models
Lateral Movement endpoint-login:fail (authentication-failed)
entrust-ie-kv-endpoint-login-fail-authfail
entrust-ie-kv-endpoint-login-fail-authfailforuser

endpoint-login:success (authentication-successful)
entrust-ie-kv-endpoint-login-success-sucesssauth
T1078 - Valid Accounts
T1090 - Proxy
T1090.003 - Proxy: Multi-hop Proxy
  • 1 Rules
Malware endpoint-login:success (authentication-successful)
entrust-ie-kv-endpoint-login-success-sucesssauth
T1078 - Valid Accounts
  • 1 Rules
Ransomware endpoint-login:fail (authentication-failed)
entrust-ie-kv-endpoint-login-fail-authfail
entrust-ie-kv-endpoint-login-fail-authfailforuser

endpoint-login:success (authentication-successful)
entrust-ie-kv-endpoint-login-success-sucesssauth
T1078 - Valid Accounts
  • 1 Rules

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

External Remote Services

Valid Accounts

Valid Accounts

Valid Accounts

Brute Force

Proxy: Multi-hop Proxy

Proxy