Rules: Web Servers Executing Suspicious Processes
This rule looks for suspicious processes on all systems labeled as web servers. A list of web servers should be populated in order to enable the rule.
Detail | Value |
---|---|
Type | Templated Match |
Category | Defense Evasion |
Apply Risk to Entities | device_hostname, device_ip, user_username |
Signal Name | Web Servers Executing Suspicious Processes |
Summary Expression | Suspicious process detected on host: {{device_hostname}} designated a web server |
Score/Severity | Static: 4 |
Enabled by Default | False |
Prototype | False |
Tags | _mitreAttackTactic:TA0003, _mitreAttackTechnique:T1505, _mitreAttackTechnique:T1505.003 |
Origin | Field |
---|---|
Normalized Schema | commandLine |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | listMatches |
Normalized Schema | user_username |