AI Engine Rules June 2014



Similar documents
LogRhythm Threat Detection Cookbook. LogRhythm Labs Threat Intelligence

74% 96 Action Items. Compliance

Global Partner Management Notice

LogRhythm and PCI Compliance

SANS Top 20 Critical Controls for Effective Cyber Defense

The Business Case for Security Information Management

PCI and PA DSS Compliance Assurance with LogRhythm

USM IT Security Council Guide for Security Event Logging. Version 1.1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

How To Manage Security On A Networked Computer System

LogRhythm and NERC CIP Compliance

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Did you know your security solution can help with PCI compliance too?

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Protecting the Infrastructure: Symantec Web Gateway

How To Secure An Rsa Authentication Agent

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Automate PCI Compliance Monitoring, Investigation & Reporting

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

March

A Decision Maker s Guide to Securing an IT Infrastructure

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

GFI White Paper PCI-DSS compliance and GFI Software products

SonicWALL PCI 1.1 Implementation Guide

Network Security Policy

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Automation Suite for. 201 CMR Compliance

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Cyber Essentials. Test Specification

V ISA SECURITY ALERT 13 November 2015

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

White Paper. PCI Guidance: Microsoft Windows Logging

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

The Comprehensive Guide to PCI Security Standards Compliance

MSSTAN 1504: Supplier Security Requirements and Expectations (SSRE) Web Applications For Externally Facing (Public) Data

Achieving PCI-Compliance through Cyberoam

Firewall Firewall August, 2003

How To Manage A Privileged Account Management

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

PCI COMPLIANCE Protecting Against External Threats Protecting Against the Insider Threat

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

TIBCO LogLogic. PCI Compliance Suite Guidebook. Software Release: December Two-Second Advantage

Fifty Critical Alerts for Monitoring Windows Servers Best practices

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

October Application Control: The PowerBroker for Windows Difference

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Portal Administration. Administrator Guide

Designing a security policy to protect your automation solution

Retail Stores Networks and PCI compliance

Security Analytics Engine 1.0. Help Desk User Guide

How To Protect Your Data From Being Stolen

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

CorreLog Alignment to PCI Security Standards Compliance

Grandstream Networks, Inc. UCM6100 Security Manual

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Networking for Caribbean Development

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Alert (TA14-212A) Backoff Point-of-Sale Malware

Guidance Regarding Skype and Other P2P VoIP Solutions

Defending Against Data Beaches: Internal Controls for Cybersecurity

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Streamlining Web and Security

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Contents Notice to Users

Glasnost or Tyranny? You Can Have Secure and Open Networks!


GE Measurement & Control. Cyber Security for NERC CIP Compliance

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Cyber Essentials PLUS. Common Test Specification

FISMA / NIST REVISION 3 COMPLIANCE

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Chapter 4 Security and Firewall Protection

Top 5 Essential Log Reports

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

Locking down a Hitachi ID Suite server

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Firewall Defaults and Some Basic Rules

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Sitefinity Security and Best Practices

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Metric Matters. Dain Perkins, CISSP

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Transcription:

AI Engine Rules June 2014

LogRhythm AI Engine Rules 2014 LogRhythm, Inc. All rights reserved This document contains proprietary information, which is protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of LogRhythm, Inc. Warranty The information contained in this document is subject to change without notice. LogRhythm, Inc. makes no warranty of any kind with respect to this information. LogRhythm, Inc. specifically disclaims the implied warranty of the merchantability and fitness for a particular purpose. LogRhythm, Inc. shall not be liable for any direct, indirect, incidental, consequential, or other damage alleged in connection with the furnishing or use of this information. Trademark LogRhythm is a trademark of LogRhythm, Inc. LogRhythm Inc. 4780 Pearl East Circle Boulder CO, 80301 (303) 413-8745 www.logrhythm.com LogRhythm Customer Support support@logrhythm.com 2

LogRhythm AI Engine Rules Table of Contents Security Analytics Suites... 4 Advanced Persistent Threats (APTs)... 4 Multi-Dimensional Behavioral Analytics (MDBA)... 6 Network Behavior Anomaly Detection (NBAD)... 7 Privileged User Monitoring (PUM)... 8 Retail Cyber Crime*... 9 SANS Critical Security Controls... 9 Targeted Host Activity Monitoring*... 11 Web Application Defense... 11 Compliance Automation Suites... 12 201 CRM 17... 12 DoDI 8500.2... 12 FISMA... 12 GPG-13... 12 HIPAA... 13 ISO 27001... 13 NEI... 13 NERC CIP... 13 NIST 800-35... 15 NRC... 17 PCI DSS... 17 SOX-COSO... 18 3 2012 LogRhythm Inc.

Overview This document lists the currently available LogRhythm Advanced Intelligence Engine (AI Engine) Rules. These AI Engine Rules are available as of the 6.2.3 Knowledge Base release. Rules that are being released in BETA status are denoted with an asterisk (*) next to the rule name. Security Analytics Suites Advanced Persistent Threats (APTs) Abnormal Authentication Behavior Abnormal Data Transfer Size Abnormal Email Activity Abnormal FIM Activity Abnormal Connections Abnormal Malicious Classification Abnormal Outbound Connections Abnormal Process Activity Abnormal Rate Increase Of Outbound Traffic Account Compromised: Account Probe Account Attack: Account Probe On Multiple Hosts Account Attack: Account Probe On Multiple Hosts Account Compromised: Account Probe On Multiple Hosts Account Scan Account Scan Account Scan On Single Host Account Scan On Single Host Attack/Compromise Attack/Compromise Attack/Compromise Followed By Process Starting Attack/Compromise Followed By Process Starting Audit Log Cleared Audit Log Cleared Botnet Zombie Botnet Zombie Infestation Brute Force From Distributed Origin Hosts Brute Force From Distributed Origin Hosts Brute Force From A Single Origin Host Brute Force From A Single Origin Host Commonly Probed Port Commonly Probed Port Direction/Type Operations 4

Communication with Low Reputation Address Compromised Account Compromised Data Compromised Host Concurrent Authentications From Multiple Cities Concurrent Authentications From Multiple Countries Concurrent Authentications From Multiple Regions Concurrent VPN Authentications From Same User Connection Open Connection Opened To Attacker Critical Data Destruction Critical Data Destruction Data Loss Data Loss Data Stolen Denial Of Service Attack Denial Of Service Attack Distributed Denial Of Service Attack Excessive HTTP Errors Increase In Outbound Connections Malware Outbreak Multiple Unique Attacks Multiple Unique Attacks Against Same Host Non-Trivial Rate Increase In Outbound Traffic Ping Sweep Ping Sweep Port Probe Port Probe Port Scan Port Scan Port Scan Followed By an Attack Port Scan Followed By An Attack Privilege Escalation Privilege Escalation Reconnaissance Reconnaissance Reconnaissance Followed By Account Creation Reconnaissance Followed By Account Creation Reconnaissance Followed By Process Starting Reconnaissance Followed By Process Starting Corroborated Anomalies Corroborated Anomalies Corroborated Anomalies 5

Remote Authentication Slow Port Scan Slow Port Scan Spamming Zombie Abnormal Amount Of Audit Failures Abnormal Authentication Behavior Abnormal File Access Abnormal Origin Location Abnormal Process Activity Attack Followed By An Attacker Login Attack Followed By An Attacker Login Compromise or Attack Followed By Time Change Default MetaSploit Port Default MetaSploit Port Dot Dot Slash Directory Traversal Dot Dot Slash Directory Traversal Payload Download Observed SQL Injection SQL Injection Threat List - abuse.ch SpyEye IP Threat List - abuse.ch Zeus IP Threat List - AlienVault IP Threat List - SRI Malware Threat Center IP Threat List - Tor Exit Node Threat List - Tor Server Vulnerability Exploited Vulnerability Exploited XSS Attack XSS Attack ZeroAccess Botnet Communication Multi-Dimensional Behavioral Analytics (MDBA) Abnormal Authentication Behavior Abnormal Email Activity Abnormal FIM Activity Abnormal Connections Abnormal Malicious Classification Abnormal Outbound Connections Abnormal Process Activity Abnormal Rate Increase Of Outbound Traffic Communication with Low Reputation Address Account Account Account Account Account Direction/Type 6

Compromised Account Compromised Data Compromised Host Increase In Outbound Connections Non-Trivial Rate Increase In Outbound Traffic Abnormal Amount Of Audit Failures Abnormal Authentication Behavior Abnormal File Access Abnormal Origin Location Abnormal Process Activity Network Behavior Anomaly Detection (NBAD) Internationalized Domain Name (IDN) Abnormal Application Activity Blacklist Transfer During Off-Hours Chat Traffic Excessive FW Denies Excessive FW Denies Followed By Allow Excessive Firewall Accepts Multiple Src Single Dst Excessive FW Accepts To Multiple Hosts Excessive FW Denies Followed By Allow Excessive IRC Connections To A Single Impacted Host Excessive IRC Connections To A Single Origin Host Excessive Outbound FW Denies Hidden FTP Server Insecure Communication Usage ICMP Flood TCP Flood UDP Flood Unknown Flood Large Outbound Transfer Long ICMP Flow Outbound ICMP Flood Outbound TCP Flood Outbound UDP Flood Outbound Unknown Flood P2P Client Making Excessive Connections Potential DDoS Potential DDoS Against Single Host Potential ICMP DDoS Potential TCP DDoS Corroborated Anomalies Corroborated Anomalies Corroborated Anomalies Account Account Account Account Account Direction/Type 7

Repeat Signature Detection Rogue Host Detection Sessions Over 48 Hours Unauthorized/Risky Applications Web Server DDoS Attack Attack Followed By Firewall Allow DMZ Jumping Inbound Connection With Non-Whitelisted Country Inbound ICMP Flood Inbound RDP Access Inbound RDP From Blacklisted Country Inbound TCP Flood Inbound UDP Flood Inbound Unknown Flood Connection With Blacklisted Country MAC Spoofing New Application Detection Non-Whitelist Transfer During Off-Hours Outbound Connection With Blacklisted Country Outbound Connection With Non-Whitelisted Country Port Misuse 22 Port Misuse 443 Port Misuse 53 Port Misuse 80 Port Misuse HTTP Port Misuse SSH In Port Misuse SSH Out Rogue Wireless Host Top Level Domain (TLD) Privileged User Monitoring (PUM) Impersonation Mass File Deletion By A Privileged User Multiple Accounts Deleted By A Privileged User Multiple Accounts Disabled By A Privileged A User Multiple Failed Attempts To Logon To Non-Primary Exchange Account Multiple Users Added To A Privileged Group Multiple Users Removed From A Privileged Group New Administrator Activity Password Changed On Multiple Accounts By A Privileged User Direction/Type Account Account Account Account Account Account Account Account Audit Account 8

Password Modified By Privileged User Privileged User's Password Modified Recently Disabled Privileged Cant Access Failures Recently Disabled Privileged Cant Access Success User Not In Sudoers File Retail Cyber Crime* Abnormal CE From Payment System Abnormal CE From POS Endpoint Abnormal Payment Sys Authentication Activity Abnormal Payment System File Access Abnormal Payment System Network Communications Abnormal POS Authentication Activity Abnormal POS File Access Abnormal POS Network Communication New Process On Payment System New Process On POS Payment System Endpoint DLD Event Payment System File System Modified POS Endpoint DLD Event POS Endpoint File System Modified SANS Critical Security Controls Password Modified By Another User Abnormal File Access Account Created, Used, Deleted Impersonation Multiple Accounts Deleted By A Privileged User Multiple Accounts Disabled By A Privileged A User Recently Disabled Account Access Failures Recently Disabled Account Access Success User Not In Sudoers File Abnormal FIM Activity Dot Dot Slash Directory Traversal SQL Injection XSS Attack Malicious Use-Agent Threat List abuse.ch SpyEye IP Threat List abuse.ch Zeus IP Threat List AlienVault IP Threat List SRI Malware Threat Center IP Account Audit Account Audit Account Account Account Direction/Type Direction/Type Account Audit Account Account Account Account Account Account Account Account 9

Threat List Tor Exit Node Threat List Tor Server URL Characters Denial Of Service Attack Distributed Denial Of Service Attack Multiple Unique Attacks Against Same Host Port Scan Followed By An Attack Repeat Signature Detected Connection Opened To Attacker Data Loss Threat List abuse.ch SpyEye Domain Threat List abuse.ch Zeus Domain Threat List Malware Domains Threat List Malware Patrol URL Attack Followed By Config Change Configuration Deleted Configuration Disabled Configuration Modified Repeat Vulnerability Detected Vulnerability After Software Install Malware Not Cleaned Multiple Failed Access Attempts Multiple Object Access Failures Outbound DNS Activity Alarm On Malware Data Loss Malware Outbreak Misuse Unauthorized Egress Port Unauthorized Ingress Port Critical Error Due To Configuration Change Audit Disabled By Privileged User Blacklisted Wireless Device Seen Multiple Passwords Modified By Another User Multiple Users Added To Administrator Group Multiple Users Removed From Administrator Group Password Changed On Multiple Accounts By Administrator Privilege Escalation Temporary Account Created And Used Excessive FW Denies 10

Excessive FW Denies Followed By Allow Large Outbound Transfer Rogue Host Detection LogRhythm Agent Heartbeat Missed LogRhythm Log Manager Heartbeat Missed LogRhythm Silent Log Source Error Backup Failure Attack Followed By Firewall Allow DMZ Jumping Inbound Connection With Non-Whitelisted Country Inbound ICMP Flood Inbound TCP Flood Inbound UDP Flood Inbound Unknown Flood Inbound New Application Detection Port Misuse 53 Port Misuse 80 Port Misuse SSH In Rogue Wireless Host Targeted Host Activity Monitoring* After-Hours Activity Unauthorized Host Unauthorized Location Unauthorized Network Unauthorized Port/Application Unauthorized Process Unauthorized User Web Application Defense Bad Bot User-Agent Bad Bot User-Agent Malicious Use-Agent Malicious User-Agent URL Characters URL Characters Operations Operations Operations Direction/Type Direction/Type 11

Compliance Automation Suites 201 CRM 17 Attack Alert Compromise Alert Denial Of Service Alert Malware Alert Vulnerability Alert DoDI 8500.2 Alarm On Compromise FISMA Alarm On Compromise Failed Writing To Audit Log GPG-13 Alarm On Compromise Alarm On Critical Alarm On Malware Account Access Granted Rule Account Access Revoked Rule Account Created Rule Account Deleted Rule Account Disabled Rule Account Locked Rule Account Modified Rule Attack Rule Audit Log Cleared Rule Audit Logging Stoppage Rule Authentication Failure Rule Backup Critical Error Rule Backup Information Rule Compromise Rule Configuration Change Rule Critical Condition Rule Denial Of Service Rule Error Condition Rule Failed Audit Log Write Rule Malware Detection Rule 12

Misuse Rule Policy Change Rule Privileged Access Failure Rule Privileged Authentication Failure Rule Reconnaissance Rule Remote Authentication Failure Rule Rogue WAP Detection Rule Signature Update Failure Rule Signatures Updated Rule Software Installation Rule Software Uninstallation Rule Software Update Failure Rule Software Updated Rule Activity Rule Vulnerability Rule Web Browsing Deny Rule HIPAA Alarm On Attack Alarm On Compromise Alarm On Malware Alarm On Misuse ISO 27001 *NIX Host Critical Condition Alarm on Malware LogRhythm Silent Log Source Error Network Device Critical Condition Windows Host Critical Condition NEI Alarm On Compromise Failed Writing To Audit Log NERC CIP Alarm On Compromise Alarm On Malware Alarm On Attack Account Access Revoked Rule Account Disabled Rule Account Locked Rule 13

Antivirus Critical Condition Rule Antivirus Error Condition Rule Attack Rule Compromise Rule Configuration Deleted Rule Configuration Disabled Rule Configuration Modified Rule Critical Condition Rule Default Act Access Failure Rule Default Act Access Success Rule Default Act Authentication Failure Rule Default Act Authentication Success Rule Denial Of Service Rule Dial-Up Initiation Rule Door Access Success Rule ESP Allowed Egress Communication Rule ESP Allowed Ingress Communication Rule ESP Denied Egress Communication Rule ESP Denied Ingress Communication Rule Malware Rule Misuse Rule Modem Enabled/Installed Rule Policy Disabled Rule Policy Modified Rule Privileged Account Access Failure Rule Privileged Account Access Success Rule Privileged Account Authentication Failure Rule Privileged Account Authentication Success Rule Privileged Account Access Granted Rule Privilege Revoked Rule Reconnaissance Rule Remote Authentication Failure Rule Remote Authentication Success Rule Shared Act Access Failure Rule Shared Act Access Success Rule Shared Act Authentication Failure Rule Shared Act Authentication Success Rule Signature Update Failure Rule Software Update Failure Rule Activity Rule 14

Door Access Rule System Shutdown Rule Term Act Access Failure Rule Term Act Access Success Rule Term Act Authentication Failure Rule Term Act Authentication Success Rule Vendor Act Access Failure Rule Vendor Act Access Success Rule Vendor Act Authentication Failure Rule Vendor Act Authentication Success Rule Vulnerability Rule NIST 800-35 Account Access Revoked Rule Account Disabled Rule Account Locked Rule Activity Rule Antivirus Critical Condition Rule Antivirus Error Condition Rule Attack Rule Audit Log Cleared Rule Audit Logging Stopped Rule Backup Critical/Error Rule Backup Information Rule Compromise Rule Configuration Change Rule Critical Condition Rule Data Loss Prevention Rule Default Act Access Failure Rule Default Act Access Success Rule Default Act Authentication Failure Rule Default Act Authentication Success Rule Denial Of Service Rule Door Access Success Rule Error Condition Rule Brute Force Success From Distributed Origin Hosts Brute Force Success From Single Origin Host Rule Concurrent Remote Authentication Successes from Multiple Cities Rule Concurrent Remote Authentication Successes from Multiple Countries Rule Concurrent Remote Authentication Successes from Multiple Regions Rule Concurrent VPN Authentications From Same User 15

Host Compromise Followed by Account Created Rule Host Compromise Followed by Audit Log Cleared Rule Host Compromise Followed by Critical Data Destruction Rule Multiple Unique Attacks Against Same Host Successful Account Probe On Multiple Hosts Rule Successful Account Probe On Single Host Rule Successful Denial Of Service Rule Successful Distributed Denial Of Service Rule Failed Audit Log Write Rule File Integrity Monitor Log Rule Guest Act Access Failure Rule Guest Act Authentication Failure Rule Host Compromise by Attacker Followed by Time Change Rule Account Created, Used, Then Deleted Rule Brute Force Success From A Single Origin Host Rule Brute Force Success From Distributed Origin Hosts Rule Host Compromise Followed by Account Created Rule Host Compromise Followed by Audit Log Cleared Rule Host Compromise Followed by Critical Data Destruction Rule Malware Activity From Multiple Hosts Rule Multiple Unique Attacks Against Same Host Spamming System Rule Successful Account Probe On Multiple Hosts Rule Successful Account Probe On Single Host Rule Malware Rule Misuse Rule Policy Change Rule Privileged Account Access Failure Rule Privileged Account Authentication Failure Rule Privileged Group Access Granted Rule Reconnaissance Rule Remote Authentication Failure Rule Rogue WAP Detection Rule Shared Act Access Failure Rule Shared Act Authentication Failure Rule Signature Update Failure Rule Software Installed Rule Software Update Failure Rule SPAM Detection Rule Activity Rule 16

Door Access Rule Term Act Access Failure Rule Term Act Access Success Rule Term Act Authentication Failure Rule Term Act Authentication Success Rule Vendor Act Access Failure Rule Vendor Act Authentication Failure Rule Vulnerability Rule NRC Alarm On Compromise Failed Writing To Audit Log PCI DSS Account Disabled/Locked AIE Rule Attack Alert Rule Backup Failure Alert Rule Backup Information AIE Rule Compromise Alert Rule Database Authentication AIE Rule DB Account Authentication Failure Alert Rule Denial Of Service Alert Rule FIM Failure Alert Rule FIM Information AIE Rule Invalid Account Usage AIE Rule Invalid Act Authentication Failure Alert Rule Malware Alert Rule Rogue WAP Detected Alert Rule Software Update Failure Alert Rule Vendor Account Enabled Alert Rule Vendor Authentication Activity AIE Rule Vendor Authentication Failure Alert Rule Vulnerability Alert Rule Antivirus Failure Alert Rule Antivirus Information AIE Rule Audit Log Cleared Alert Rule Audit Log Write Failure Alert Rule Denied CDE => Internet Communication AIE Rule Denied DMZ => Communication AIE Rule Denied Inet => Communication AIE Rule Denied Internet => CDE Communication AIE Rule 17

Denied Internet => DMZ Comm AIE Rule Denied Internet => Inet Communication AIE Rule Denied Internet => Internet Communication AIE Rule Denied Test => Communication AIE Rule Denied Test => Internet Communication AIE Rule Denied Wireless => CDE Communication AIE Rule FIM Add Activity AIE Rule FIM Delete Activity AIE Rule FIM Group Change Activity AIE Rule FIM Modify Activity AIE Rule FIM Owner Change Activity AIE Rule FIM Permission Activity AIE Rule Firewall Policy Synch Information AIE Rule FW Policy Synch Failure Alert Rule Host Firewall Failure Alert Rule Host Firewall Information AIE Rule Invalid CDE => Internet Communication AIE Rule Invalid DMZ => Communication AIE Rule Invalid Inet => Internet Communication AIE Rule Invalid Internet => CDE Communication AIE Rule Invalid Internet => DMZ Communication AIE Rule Invalid Internet => Inet Communication AIE Rule Invalid Internet => Internet Communication AIE Rule Invalid Test => Communication AIE Rule Invalid Test => Internet Communication AIE Rule Invalid Wireless => CDE Communication AIE Rule Object Disposal Failure Alert Rule Physical Access Failure Alert Rule Physical Access Usage AIE Rule Privileged Acct Authentication Failure Alert Rule Reconnaissance Activity Alert Rule Remote Session Timeout AIE Rule Signature Update Failure Alert Rule Activity Alert Rule SOX-COSO Alarm On Attack Alarm On Compromise Alarm On Malware 18