Skip to main content
Skip table of contents

Threat Detection Rules

Threat detection rules provide your team with an additional resource for threat research and dashboard configuration. The preconfigured rules deliver content out of the box.

LogRhythm Labs’ ongoing in-field and lab-based research ensures your LogRhythm Axon analytics evolve as fast as current threats.

New rules are disabled by default, and you can enable them in the Rules window.

For a complete list of MITRE threat detection rules and how to configure them, refer to the Axon MITRE ATT&CK Module.

Content Revisions

The following table summarizes the changes that have been made for the latest release.

Rule NameMITRE ATT&CK MappingMITRE ATT&CK URLRevision
T1098:Account ManipulationT1098:Account Manipulationhttps://attack.mitre.org/techniques/T1098/2024.07
T1552.004:Private KeysT1552.004:Unsecured Credentials: Private Keyshttps://attack.mitre.org/techniques/T1552/004/2024.07
T1562.001:Disable or Modify Tools:Windows DefenderT1562.001:Impair Defenses: Disable or Modify Toolshttps://attack.mitre.org/techniques/T1562/001/2024.07
T1134.002:Access Token Manipulation:Create Process with Token (updated)T1134.002:Access Token Manipulation: Create Process with Tokenhttps://attack.mitre.org/techniques/T1134/002/2024.07
T1562.002:Impair Defenses: Disable Windows Event Logging (updated)T1562.002:Impair Defenses: Disable Windows Event Logginghttps://attack.mitre.org/techniques/T1562/002/2024.07
T1621:MFA Request Generation:Repeated OKTA Push DeniesT1621:Multi-Factor Authentication Request Generationhttps://attack.mitre.org/techniques/T1621/2024.07
T1059.003:Windows Command ShellT1059.003:Command and Scripting Interpreter: Windows Command Shellhttps://attack.mitre.org/techniques/T1059/003/2024.07
T1021.001:Remote Services: Remote Desktop ProtocolT1021.001:Remote Services: Remote Desktop Protocolhttps://attack.mitre.org/techniques/T1021/001/2024.07
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.