Checkpoint_SmartConsole_Object_Create
ID: 100323
Description:
Checkpoint Admin Operation from SmartConsole logs
Repository: Group: Checkpoint Type: event
Default Status:
Enabled
| Tags: |
|---|
| CheckPoint |
Selector:
Query:
Filters:
| Field | MUST hit |
|---|---|
| @checkpoint.product | SmartConsole |
| @checkpoint.operation | Create Object |
| Field | MUST NOT hit |
|---|---|
Behavior Rule:
| Key | Type | Behavior Category |
|---|---|---|
| @checkpoint.administrator | username | application activity |
Risks:
| Risks | Base Score | Dimension |
|---|---|---|
| ALERT_POLICY | 200 | alert |
Attributes:
| Alias | Key |
|---|---|
| User | @checkpoint.administrator |
| ClientIP | @checkpoint.client_ip |
| Subject | @checkpoint.subject |
| ObjectName | @checkpoint.objectname |
| ObjectType | @checkpoint.objecttype |
| FieldsChanges | @checkpoint.fieldschanges |
| LogicChanges | @checkpoint.logic_changes |
| AdvancedChanges | @checkpoint.advanced_changes |
| SessionName | @checkpoint.session_name |
| IPAddress | @checkpoint.ip_address |
Correlation Rules:
First Occurrence:
| Name | Window | Fields |
|---|---|---|
| NewUser | 20 days | @checkpoint.administrator |
| Risks: | ML_NEW_USER |
History:
| User | Date |
|---|---|
| ho*d@fluencysecurity.com | 2021 Jul 30 11:47:28 EDT |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)