Checkpoint_SmartConsole_Rule_Create
ID: 100321
Description:
Checkpoint Admin Operation from SmartConsole logs
Repository: Group: Checkpoint Type: event
Default Status:
Enabled
Tags: |
---|
CheckPoint |
Selector:
Query:
Filters:
Field | MUST hit |
---|---|
@checkpoint.product | SmartConsole |
@checkpoint.operation | Create Rule |
Field | MUST NOT hit |
---|---|
Behavior Rule:
Key | Type | Behavior Category |
---|---|---|
@checkpoint.administrator | username | application activity |
Risks:
Risks | Base Score | Dimension |
---|---|---|
ALERT_POLICY | 200 | alert |
Attributes:
Alias | Key |
---|---|
User | @checkpoint.administrator |
ClientIP | @checkpoint.client_ip |
Subject | @checkpoint.subject |
ObjectName | @checkpoint.objectname |
ObjectType | @checkpoint.objecttype |
FieldsChanges | @checkpoint.fieldschanges |
LogicChanges | @checkpoint.logic_changes |
AdvancedChanges | @checkpoint.advanced_changes |
SessionName | @checkpoint.session_name |
Correlation Rules:
First Occurrence:
Name | Window | Fields |
---|---|---|
NewUser | 20 days | @checkpoint.administrator |
Risks: | ML_NEW_USER |
History:
User | Date |
---|---|
ho*d@fluencysecurity.com | 2021 Jul 30 11:42:41 EDT |
ho*d@fluencysecurity.com | 2021 Jul 30 11:43:10 EDT |
ho*d@fluencysecurity.com | 2021 Jul 30 11:44:44 EDT |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)