Rules: Inbound Port Scan
This rule detects port scanning activity from external actors against public facing assets.
Detail | Value |
---|---|
Type | Threshold |
Category | Discovery |
Apply Risk to Entities | dstDevice_ip, dstDevice_hostname |
Signal Name | Inbound Port Scan |
Summary Expression | External port scan from IP: {{srcDevice_ip}} detected |
Threshold Count | 20 |
Threshold Window | 5m |
Score/Severity | Static: 0 |
Enabled by Default | False |
Prototype | False |
Tags | _mitreAttackTactic:TA0043, _mitreAttackTechnique:T1595, _mitreAttackTechnique:T1595.001, _mitreAttackTechnique:T1595.002 |
- Amazon AWS - Network Firewall
- Amazon AWS - VpcFlowLogs
- Bro - Bro
- CheckPoint - Firewall and VPN
- CheckPoint - SmartDefense
- CheckPoint - URL Filtering
- Cisco Systems - ASA
- Cisco Systems - Firepower
- Cisco Systems - Meraki
- Dell - Firewall
- Fortinet - Fortigate
- Netskope - Security Cloud
- OISF - Suricata IDS
- Palo Alto Networks - Next Generation Firewall
- Sophos - UTM 9
- Zscaler - Nanolog Streaming Service
Origin | Field |
---|---|
Normalized Schema | dstDevice_hostname |
Normalized Schema | dstDevice_ip |
Normalized Schema | dstPort |
Normalized Schema | objectType |
Normalized Schema | srcDevice_ip_isInternal |