LoFP LoFP / infrastructure

infrastructure rule

TitleTags
administrators may access these files for initial setup or troubleshooting. limited in most environments. tune as needed.
administrators may use this command when installing third party vibs. tune as needed.
administrators may use this command when troubleshooting. tune as needed.
false positives may occur. it is recommended to fine-tune okta settings and the analytic to ensure high fidelity. adjust the risk score as necessary.
fidelity of this is high as okta is specifying malicious infrastructure. filter and modify as needed.
limited false positives in most environments after initial setup, however tune as needed.
limited false positives in most environments, however tune as needed.
limited false positives in most environments, however tune as needed. administrators may use the root account for troubleshooting or initial user creation.
limited false positives in most environments, however tune as needed. some administrators may use ssh for troubleshooting.
new local accounts being created in esxi is rare in most environments. tune as needed.
none currently known
some third party vendor vibs or patches may require the force option.
this search might be prone to high false positives if dhcp snooping has been incorrectly configured or in the unlikely event that the dhcp server has been moved to another network interface.
this search might be prone to high false positives if dhcp snooping or arp inspection has been incorrectly configured, or if a device normally sends many arp packets (unlikely).
this search might be prone to high false positives if you have malfunctioning devices connected to your ethernet ports or if end users periodically connect physical devices to the network.
this search might be prone to high false positives. please consider this when conducting analysis or investigations. authorized devices may be detected as unauthorized. if this is the case, verify the mac address of the system responsible for the false positive and add it to the assets and identity framework with the proper information.
this search will also report any legitimate attempts of software downloads to network devices as well as outbound ssh sessions from network devices.
this search will return false positives for any legitimate traffic captures by network administrators.