LoFP
/
aws instance
Title
Tags
it's possible that a new user will start to modify ec2 instances when they haven't before for any number of reasons. verify with the user that is modifying instances that this is the intended behavior.
t1078.004
aws instance
splunk
it's possible that a user has legitimately deleted a network acl.
t1562.007
aws instance
splunk
it's possible that an admin has created this acl with all ports open for some legitimate purpose however, this should be scoped and not allowed in production environment.
t1562.007
aws instance
splunk
no false positives have been identified at this time.
t1003
t1003.001
t1003.003
t1003.005
t1005
t1012
t1016
t1021
t1021.001
t1027
T1027.011
t1036
t1036.003
t1036.004
t1037.001
t1041
t1046
t1048
t1048.003
t1053
t1053.005
T1053.007
t1055
t1055.001
T1055.002
t1059
t1059.001
t1059.002
t1059.003
t1059.004
t1059.005
t1059.007
t1068
t1069.001
t1069.002
t1070
t1070.004
T1070.008
t1071
t1071.004
t1074
t1078
t1078.004
t1082
t1087
t1087.001
t1087.002
t1087.004
t1090.001
t1090.003
t1098
t1098.003
t1105
t1110
T1110.003
t1112
t1113
t1114.001
t1124
t1127
t1129
t1134
t1134.004
t1134.005
t1185
t1190
t1195
t1200
t1202
t1203
t1204
t1204.002
T1204.003
t1207
t1210
t1212
t1218.005
t1218.007
t1218.010
t1218.011
t1220
t1222
t1222.001
t1482
t1484
t1484.001
t1485
t1486
t1489
t1490
T1497.003
t1498
t1505
t1526
t1529
t1531
t1543
t1546
t1546.001
t1546.002
t1546.011
t1547.003
t1547.005
T1547.012
t1548
t1548.002
t1552.002
t1552.004
t1552.006
t1552.007
t1553.005
t1554
t1555.003
t1555.005
t1556
T1557.002
t1558
T1558.004
t1560
t1560.001
t1562
t1562.001
t1562.004
t1562.006
t1562.008
t1564.001
t1564.004
t1566
t1566.001
t1566.002
t1574.001
T1574.009
T1590.005
t1649
amazon elastic container registry
azure tenant
circleci
aws account
o365 tenant
github
aws instance
kubernetes
infrastructure
network
identity
windows
endpoint
splunk
the false-positive rate may vary based on the values of`datapointthreshold` and `deviationthreshold`. additionally, false positives may result when aws administrators roll out policies enforcing network blocks, causing sudden increases in the number of blocked outbound connections.
aws instance
splunk
this is a strictly behavioral search, so we define \"false positive\" slightly differently. every time this fires, it will accurately reflect the first occurrence in the time period you're searching within, plus what is stored in the cache feature. but while there are really no \"false positives\" in a traditional sense, there is definitely lots of noise. this search will fire any time a new ip address is seen in the **geoip** database for any kind of provisioning activity. if you typically do all provisioning from tools inside of your country, there should be few false positives. if you are located in countries where the free version of **maxmind geoip** that ships by default with splunk has weak resolution (particularly small countries in less economically powerful regions), this may be much less valuable to you.
t1078
aws instance
splunk
when a legitimate new user logins for the first time, this activity will be detected. check how old the account is and verify that the user activity is legitimate.
T1535
t1552
t1586.003
aws instance
splunk