LoFP LoFP / not all unauthenticated requests are malicious, but source ips, useragent, verb, request uri and response status will provide context.

Techniques

Sample rules

Kubernetes Azure scan fingerprint

Description

This search provides information of unauthenticated requests via source IP user agent, request URI and response status data against Kubernetes cluster in Azure

Detection logic

`kubernetes_azure` category=kube-audit 
| spath input=properties.log 
| search responseStatus.code=401 
| table  sourceIPs{} userAgent verb requestURI responseStatus.reason 
|`kubernetes_azure_scan_fingerprint_filter`

Kubernetes Azure pod scan fingerprint

Description

This search provides information of unauthenticated requests via source IP user agent, request URI and response status data against Kubernetes cluster pod in Azure

Detection logic

`kubernetes_azure` category=kube-audit 
| spath input=properties.log 
| search responseStatus.code=401 
| table  sourceIPs{} userAgent verb requestURI responseStatus.reason properties.pod 
|`kubernetes_azure_pod_scan_fingerprint_filter`