LoFP
/
t1562.004
t1562.004
Title
Tags
a network operator or systems administrator may utilize an automated or manual execution of this firewall rule that may generate false positives. filter as needed.
t1562.004
endpoint
splunk
admin activity
t1033
t1059
t1059.004
t1070
t1070.001
t1136
t1136.001
t1485
t1505
t1505.003
t1546
t1546.001
t1562
t1562.002
t1562.004
linux
windows
sigma
administrator may do this commandline for auditing and testing purposes. in this scenario filter is needed.
t1562.004
endpoint
splunk
administrator may modify or delete firewall configuration.
t1562.004
endpoint
splunk
administrator or network operator can use this application for automation purposes. please update the filter macros to remove false positives.
t1016
t1030
t1033
t1053.002
t1053.003
t1083
t1136.001
t1140
t1222.002
t1485
t1489
t1546.004
t1547.006
t1552.004
t1555.005
t1562.004
T1562.012
t1569.002
t1574.006
endpoint
splunk
administrator scripts or activity.
t1562
t1562.004
windows
sigma
firewall being modified or deleted may be performed by a system administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
t1562
t1562.004
azure
sigma
firewall modified or deleted from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
t1562
t1562.004
azure
sigma
legitimate admin activity
t1003
t1003.003
t1018
t1069
t1069.002
t1087
t1087.002
t1482
t1562
t1562.004
linux
windows
sigma
legitimate admin changes, group policy updates, software installs, security tools, and automated scripts can trigger false positives for event id 4946.
t1562.004
endpoint
splunk
legitimate admin delete, group policy updates, software installs, security tools, and automated scripts can trigger false positives for event id 4948.
t1562.004
endpoint
splunk
legitimate administration activities
t1007
t1016
t1018
t1033
t1037
t1037.005
t1040
t1046
t1053
t1053.002
t1053.003
t1059
t1059.012
t1069
t1069.001
t1070
t1070.002
t1070.004
t1078
t1078.003
t1082
t1087
t1087.001
t1090
t1098
t1105
t1136
t1136.001
t1140
t1201
t1518
t1518.001
t1529
t1546
t1546.014
t1548
t1548.001
t1552
t1552.001
t1553
t1553.004
t1555
t1555.001
t1562
t1562.004
t1564
t1564.002
t1565
t1565.001
t1592
t1592.004
macos
linux
windows
sigma
legitimate administration activity
t1016
t1018
t1040
t1090
t1482
t1562
t1562.004
windows
sigma
legitimate adminstrative usage of this functionality will trigger this detection.
t1021.007
t1072
t1105
t1202
t1484
t1529
t1562.001
t1562.004
azure tenant
splunk
legitimate ports redirect
t1562
t1562.004
linux
sigma
network administrators
t1562
t1562.004
linux
sigma
rule collections (application, nat, and network) being modified or deleted may be performed by a system administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
t1562
t1562.004
azure
sigma
rule collections (application, nat, and network) modified or deleted from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
t1562
t1562.004
azure
sigma
software installations
t1562
t1562.004
windows
sigma
software installations and removal
t1562
t1562.004
windows
sigma
some vpn applications are known to launch netsh.exe. outside of these instances, it is unusual for an executable to launch netsh.exe and run commands.
t1090.001
t1562.004
endpoint
splunk