LoFP LoFP / t1595.002

t1595.002

TitleTags
blocked connection events are generated via an access control policy on the firewall management console. hence no false positives should be present.
false positives can occur in environments where vulnerability scanners or malware sandboxes are actively generating simulated attacks. additionally, noisy or overly aggressive snort rules may produce bursts of alerts from legitimate applications. review host context before escalating.
internal vulnerability scanners will trigger this detection.
legitimate security scanning.
misconfigured applications or automated scripts may generate repeated blocked traffic, particularly if attempting to reach decommissioned or restricted resources. vulnerability scanners or penetration testing tools running in authorized environments may trigger this alert. tuning may be required to exclude known internal tools or scanner ips from detection.
various, could be noisy depending on processes in the organization and sysmon configuration used. adjusted port/dest count thresholds as needed.