Skip to main content
Skip table of contents

CIS Controls - AI Engine Rules

The current version of this table is built on Version 7.1 of the CIS Controls. A mapping to Version 8 of the CIS Controls, will be completed in 2022. 

Implementation Group 1

AI Engine RulesDescriptionControl SupportAlarmingClassificationsLog Sources
CCF: Account ModificationThis AIE Rule creates a common event and provides detail around account modification activity.4.2NoAudit: Account ModifiedInclude All Log Sources
CCF: Account Password Not ChangedThis rule is triggered when a user account is created and its password is not modified within three days of creation.4.2NoAudit: Account CreatedInclude All Log Sources
CCF: Audit Disabled by AdminLogin by an administrator followed by disabling of an audit process.  CIS Critical Security Control(s): CSC 6.26.2NoSecurity: Compromise1. Include All Log Sources
2. Include All Log Sources
CCF: Audit Logging Stopped AlarmThis AIE Rule provides details on audit logging being stopped.6.2YesAudit: ConfigurationInclude All Log Sources
CCF: Backup Failure AlarmMore than 10 backup failure events are detected.10.1, 10.2YesOperations: ErrorInclude All Log Sources
CCF: Backup InformationThis AIE Rule creates events for information from backup software.10.1, 10.2NoOperations: InformationInclude All Log Sources
CCF: Blacklisted Egress Port ObservedTriggered when an internal host communicates with a host outside the network using a port not on the allowed list.9.4, 12.4NoSecurity: CompromiseInclude All Log Sources
CCF: Blacklisted Ingress Port ObservedTriggered when an external host communicates with a network host on a port not on the allowed ingress list.  CIS Critical Security Control(s): CSC 9.4, CSC 12.39.4, 12.4NoSecurity: AttackInclude All Log Sources
CCF: Config Change After AttackAttack event on a host followed by a configuration change made to that host within 3 minutes. 5.1NoSecurity: Compromise1. Include All Log Sources
2. Include All Log Sources
CCF: Config Change then Critical ErrorConfiguration change followed by a critical error on the same host indicating an erroneous configuration, malicious intent or otherwise.5.1NoSecurity: Compromise1. Include All Log Sources
2. Include All Log Sources
CCF: Config Deleted/DisabledConfiguration deleted or disabled within the organization infrastructure.   5.1NoSecurity: CompromiseInclude All Log Sources
CCF: Config ModifiedConfiguration modified within the organization infrastructure.5.1NoSecurity: CompromiseInclude All Log Sources
CCF: Critical/PRD Envir Patch Failure AlarmThis AIE rule creates an alert any time a patch fails to apply to the critical or production environments (entity structure).3.4, 3.5NoOperations: ErrorInclude All Log Sources
CCF: Domain Trust ModifiedThis rule is meant to alert when any occurrence of windows event id 4716 is observed and a domain trust is modified. 7.7, 15.10NoAudit: PolicyInclude All Log Sources
CCF: Dormant User Account ObservedRule intended to identify dormant and inactive user accounts that have no activity within the most recent 5 days after having activity in the previous 30.16.9NoAudit: Other AuditInclude All Log Sources
CCF: Early TLS/SSL AlarmThis AIE Rule alerts on the occurrence of any identified TLS LogRhythm Network Monitor event.7.1, 12.4YesSecurity: ActivityInclude All Log Sources
CCF: FIM Abnormal ActivityThis AIE Rule creates events for all abnormal file integrity monitoring activity.13.1, 14.6NoSecurity: Suspicious1. Include All Log Sources
2. Include All Log Sources
CCF: FIM Add ActivityThis AIE Rule creates events for all file integrity monitoring add activity.13.1, 14.6NoSecurity: ActivityInclude All Log Sources
CCF: FIM Delete Activity AlarmThis AIE Rule alarms on file integrity monitoring delete activity.13.1, 14.6YesSecurity: ActivityInclude All Log Sources
CCF: FIM General ActivityThis rule creates an event fir file integrity monitoring activity including adds, deletes, modifies, group changes, owner changes, and permissions. The FIM log source can be established from LogRhythm's FIM or other FIM solutions.13.1, 14.6NoOperations: InformationInclude All Log Sources
CCF: FIM InformationThis AIE Rule creates events for general file integrity monitoring information.13.1, 14.6NoOperations: InformationInclude All Log Sources
CCF: Inactive SystemsThis statistical rule is designed to monitor system access activity.  Low access activity for production servers and data storage systems is monitored over a span of 7 days.13.1, 13.2NoOperations: Other OperationsInclude All Log Sources
CCF: Inactive User ActivityThis rule block is intended to monitor user logon activity over a 6 day span as compared to the previous 14 days. If a user has not authenticated in the previous 14 days and then authenticates, this rule will fire. 16.9NoSecurity: SuspiciousInclude All Log Sources
CCF: Linux sudo Privilege EscalationUser not in the LogRhythm list "CCF: Privileged Accounts" and not in the local 'sudoers' file tries to use sudo on a Linux host. 4.3NoSecurity: SuspiciousInclude All Log Sources
CCF: Malware AlarmThis AIE Rule provides details on malware activity across the organization's environment where malware detection/prevention is applied.7.7, 8.2YesSecurity: MalwareInclude All Log Sources
CCF: MisuseThis AIE Rule provides details on misuse activity.4.3NoSecurity: MisuseInclude All Log Sources
CCF: Multiple Failed Access AttemptsUser makes multiple failed access attempts within a short time period. CIS Critical Security Control(s): CSC 16.813.1, 14.6NoSecurity: SuspiciousInclude All Log Sources
CCF: Multiple Object Access FailuresMultiple users failed to access the same file. CIS Critical Security Control(s): CSC 16.813.1, 14.6NoSecurity: SuspiciousInclude All Log Sources
CCF: New Asset
1.4, 1.6NoOperations: Other OperationsInclude All Log Sources
CCF: New Network HostThis rule is triggered when a new host is seen communicating in the environment for the first time.1.4, 1.6, 15.10NoSecurity: ReconnaissanceInclude All Log Sources
CCF: Non-Encrypted Protocol AlarmThis investigation provides details of unencrypted applications being utilized within the critical and production systems or environments (entity structure).13.6, 15.7YesOperations: InformationInclude All Log Sources
CCF: PRD Envir Signature Failure AlarmThis AIE Rule creates an alert on signature update failures on critical or production environments (entity structure).3.4, 8.2YesOperations: ErrorInclude All Log Sources
CCF: Shared Account AccessThis rule will alert when accounts listed within the CCF: Shared Accounts list have been accessed on a production server.16.8NoAudit: Authentication SuccessInclude All Log Sources
CCF: Social Media ActivityThis rule tracks social media activity, to help identify if private or personal data that should not be in transmission is present within the environment's traffic.4.3NoSecurity: SuspiciousInclude All Log Sources
CCF: Software Install RuleThis AIE rule creates an event and alerts on any software installation activity across the environment.2.6NoAudit: ConfigurationInclude All Log Sources
CCF: Software Uninstall Failure AlarmThis alerts on failed or interrupted software uninstallations.2.6YesAudit: ConfigurationInclude All Log Sources
CCF: Software Uninstall RuleThis AIE rule creates an event and alerts on any software uninstallation activity across the environment.2.6NoAudit: ConfigurationInclude All Log Sources
CCF: Unauthorized Data TransferThis rule is configured to monitor any amount of data transferred from log sources contained within the CCF: Data Storage Systems list.13.1, 13.2NoOperations: Network TrafficInclude All Log Sources
CCF: Unauthorized Executable ObservedThis rule is intended to alert when executable files that are not determined to be authorized by the organization are observed within the environment. 7.1NoOperations: Other OperationsInclude All Log Sources
CCF: Vulnerability Detected AlarmThis AIE Rule alerts on the occurrence of vulnerabilities or suspicious events across the organization's environment.3.4YesSecurity: VulnerabilityInclude All Log Sources
CCF: Windows RunAs Privilege EscalationUser not in the LogRhythm List "Privileged Users" chooses to Run a Windows program as an administrator using the "Run as administrator" option.4.3NoSecurity: Suspicious1. Include All Log Sources
2. Include All Log Sources

Implementation Group 2

AI Engine RulesDescriptionControl SupportAlarmingClassificationsLog Sources
CCF: Account Deleted RuleThis rule provides details of accounts that have been deleted16.7, 16.10NoAudit: Account DeletedInclude All Log Sources
CCF: Account Disabled RuleThis AIE Rule alerts on the occurrence of any access revoking to accounts.16.7, 16.10, 16.12NoAudit: Access RevokedInclude All Log Sources
CCF: Account Enabled RuleThis AIE Rule alerts on the occurrence of any access granting to accounts.16.7, 16.10, 16.12YesAudit: Access GrantedInclude All Log Sources
CCF: Account ModificationThis AIE Rule creates a common event and provides detail around account modification activity.4.1, 4.5, 16.7, 16.10, 16.12, 20.8NoAudit : Account ModifiedInclude All Log Sources
CCF: Admin Password ModifiedUser changes the password of a different privileged user account.14.3, 15.6NoSecurity: SuspiciousInclude All Log Sources
CCF: Audit Disabled by AdminLogin by an administrator followed by disabling of an audit process.  CIS Critical Security Control(s): CSC 6.21.3, 4.9, 6.3, 6.4, 6.5, 7.6, 8.6YesSecurity : CompromiseInclude All Log Sources
CCF: Audit Logging Stopped AlarmThis AIE Rule provides details on audit logging being stopped.1.3, 1.5, 4.9, 6.3, 6.4, 6.5, 7.6, 8.6, 8.7, 8.8YesAudit : ConfigurationInclude All Log Sources
CCF: Auth After Numerous Failed AuthsMultiple external unique login attempts are seen on the same impacted host within a short period of time, followed by a successful authentication.4.9NoSecurity : CompromiseInclude All Log Sources
CCF: Backup Failure AlarmMore than 10 backup failure events are detected.10.3YesOperations : ErrorInclude All Log Sources
CCF: Backup InformationThis AIE Rule creates events for information from backup software.10.3NoOperations : InformationInclude All Log Sources
CCF: Blacklist Location AuthAuthentication success from a blacklisted location.12.2, 12.3NoSecurity : CompromiseInclude All Log Sources
CCF: Blacklisted Account AlarmThis AIE creates an alarm when a blacklisted account activity occurs within the environment.  This requires the CCF: User Blacklist to be populated and updated regularly.16.6, 16.7, 16.10, 16.12YesAudit : Other Audit SuccessInclude All Log Sources
CCF: Blacklisted Egress Port ObservedTriggered when an internal host communicates with a host outside the network using a port not on the allowed list.   CIS Critical Security Control(s): CSC 9.4, CSC 12.31.7, 9.2, 9.3YesSecurity : CompromiseInclude All Log Sources
CCF: Blacklisted Ingress Port ObservedTriggered when an external host communicates with a network host on a port not on the allowed ingress list.  CIS Critical Security Control(s): CSC 9.4, CSC 12.31.7, 9.2, 9.3YesSecurity : AttackInclude All Log Sources
CCF: Config Change After AttackAttack event on a host followed by a configuration change made to that host within 3 minutes. 4.8, 5.4, 5.5, 11.2, 11.3NoSecurity: CompromiseInclude All Log Sources
CCF: Config Change then Critical ErrorConfiguration change followed by a critical error on the same host indicating an erroneous configuration, malicious intent or otherwise.5.4, 5.5, 11.2, 11.3, 20.4NoSecurity: CompromiseInclude All Log Sources
CCF: Config Deleted/DisabledConfiguration deleted or disabled within the organization infrastructure.   4.8, 5.4, 5.5, 11.2, 11.3NoSecurity: CompromiseInclude All Log Sources
CCF: Config ModifiedConfiguration modified within the organization infrastructure.4.8, 5.4, 5.5, 11.2, 11.3NoSecurity : CompromiseInclude All Log Sources
CCF: Credential DumpingThis rule is designed to look for processes/services started related to Mimikatz, a popular tool used in credential dumping exploits. 14.3, 15.6YesSecurity: SuspiciousInclude All Log Sources
CCF: Critical/PRD Envir Patch Failure AlarmThis AIE rule creates an alert any time a patch fails to apply to the critical or production environments (entity structure).3.1, 3.2, 8.1, 18.3, 18.8, 18.11NoOperations: ErrorInclude All Log Sources
CCF: Data Loss PreventionThis AIE Rule provides details of data generated by the LogRhythm Data Loss Defender or other data loss prevention solutions, when configured.13.7NoOperations : InformationInclude All Log Sources
CCF: Disabled Account Auth SuccessRecently disabled or deleted account authenticates or accesses resources on the network.16.7, 16.10, 16.12NoSecurity : CompromiseInclude All Log Sources
CCF: Domain Trust ModifiedThis rule is meant to alert when any occurrence of windows event id 4716 is observed and a domain trust is modified. 8.7NoAudit: PolicyInclude All Log Sources
CCF: Early TLS/SSL AlarmThis AIE Rule alerts on the occurrence of any identified TLS LogRhythm Network Monitor event.14.4, 16.5, 18.5YesSecurity: ActivityInclude All Log Sources
CCF: Excessive Authentication Failures RuleThis AIE Rule supports alerting on >10 authentication failures in 30 minutes (login failures). Match this threshold to your organization's specific authentication failure policies.4.9YesAudit: Authentication FailureInclude All Log Sources
CCF: External DNS CommunicationThis rule is intended to fire when internal hosts are seen using an external DNS server.8.7YesSecurity: SuspiciousInclude All Log Sources
CCF: FIM Abnormal ActivityThis AIE Rule creates events for all abnormal file integrity monitoring activity.5.3NoSecurity: SuspiciousInclude All Log Sources
CCF: FIM Add ActivityThis AIE Rule creates events for all file integrity monitoring add activity.5.3NoSecurity: ActivityInclude All Log Sources
CCF: FIM Delete Activity AlarmThis AIE Rule alarms on file integrity monitoring delete activity.5.3YesSecurity: ActivityInclude All Log Sources
CCF: FIM General ActivityThis rule creates an event fir file integrity monitoring activity including adds, deletes, modifies, group changes, owner changes, and permissions. The FIM log source can be established from LogRhythm's FIM or other FIM solutions.5.3NoOperations: InformationInclude All Log Sources
CCF: FIM InformationThis AIE Rule creates events for general file integrity monitoring information.5.3NoOperations: InformationInclude All Log Sources
CCF: Lateral Movement then ExfilAttack or compromise event from an internal host followed by data leaving the victim host.14.3, 15.6YesSecurity: CompromiseInclude All Log Sources
CCF: Linux sudo Privilege Escalation AttackUser not in the LogRhythm list "CCF: Privileged Accounts" and not in the local 'sudoers' file tries to use sudo on a Linux host. 4.1, 4.5, 4.8, 4.9, 11.6NoSecurity : SuspiciousInclude All Log Sources
CCF: Local Account Created and UsedAn account is created on a host and then used shortly thereafter on the same host.16.7NoSecurity : CompromiseInclude All Log Sources
CCF: Malicious IP CommunicationThis rule is intended to monitor when a network allowed communication occurs  to or from an IP on any of the LR Threat Intelligence lists.7.4, 7.6, 12.3YesSecurity: MalwareInclude All Log Sources
CCF: Malicious URLThis rule is intended to fire when malicious characters in the URL string are found in a web server log. 7.4, 7.6YesSecurity: Reconnaissance Include All Log Sources
CCF: Malware AlarmThis AIE Rule provides details on malware activity across the organization's environment where malware detection/prevention is applied.1.5, 3.1, 3.6, 5.2, 8.1, 8.6, 12.3, 12.6, 15.3, 18.8YesSecurity : MalwareInclude All Log Sources
CCF: Multiple Failed Access AttemptsUser makes multiple failed access attempts within a short time period. CIS Critical Security Control(s): CSC 16.83.3, 4.7, 5.3, 7.9, 11.6, 13.4, 20.4NoSecurity : SuspiciousInclude All Log Sources
CCF: Multiple Object Access FailuresMultiple users failed to access the same file. CIS Critical Security Control(s): CSC 16.83.3, 4.7, 5.3, 7.9, 11.6, 13.4, 20.4NoSecurity : SuspiciousInclude All Log Sources
CCF: New Network HostThis rule is triggered when a new host is seen communicating in the environment for the first time.15.1YesSecurity: Reconnaissance Include All Log Sources
CCF: New Wireless HostThis rule is triggered when a new host is seen communicating within the environment for the first time.15.1, 15.2, 15.3NoSecurity: SuspiciousInclude All Log Sources
CCF: Non-Encrypted Protocol AlarmThis investigation provides details of unencrypted applications being utilized within the critical and production systems or environments (entity structure).11.5, 12.11, 14.4, 16.5, 18.5YesOperations: InformationInclude All Log Sources
CCF: Pass the HashThis rule is intended to fire when the sekurlsa: pth command is seen with a process/service started common event. 14.3, 15.6YesSecurity: SuspiciousInclude All Log Sources
CCF: Port Misuse: 53This rule is triggered by network traffic not using DNS over the common DNS port (53). 12.2, 18.10YesSecurity: SuspiciousInclude All Log Sources
CCF: Port Misuse: 80This rule is intended to fire when traffic is seen not using HTTP over the common HTTP port (80). 12.2, 18.10YesSecurity: SuspiciousInclude All Log Sources
CCF: Powershell ExecutableThis rule is intended to fire when a powershell executable is observed. 4.7, 8.8YesSecurity: ActivityInclude All Log Sources
CCF: Powershell Executed with Encoded CommandsPowerShell Encoded Commands used to execute potentially dangerous actions on the target host.4.7, 8.8YesSecurity: CompromiseInclude All Log Sources
CCF: PRD Envir Config/Policy Change AlarmThis AIE rule creates an alert any time a configuration or policy modification logs are received from a critical or production environment (entity structure).11.2, 11.3YesAudit : PolicyInclude All Log Sources
CCF: PRD Envir Signature Failure AlarmThis AIE Rule creates an alert on signature update failures on critical or production environments (entity structure).1.5, 3.1, 3.2, 3.6, 8.1, 8.6, 11.3YesOperations: ErrorInclude All Log Sources
CCF: Priv Group Access Granted AlarmThis AIE Rule provides details on access granted to privileged groups (administrators, dnsadmins, domain admins, enterprise admins, schema admins) within the organization infrastructure.4.8, 4.9YesAudit: Access GrantedInclude All Log Sources
CCF: Rogue Access Point AlarmThis AIE Rule alerts on the occurrence of any rogue access point detection events against the organization's environment.15.2, 15.3YesSecurity: SuspiciousInclude All Log Sources
CCF: Software Install RuleThis AIE rule creates an event and alerts on any software installation activity across the environment.2.3NoAudit: ConfigurationInclude All Log Sources
CCF: Software Uninstall Failure AlarmThis alerts on failed or interrupted software uninstallations.2.3YesAudit : ConfigurationInclude All Log Sources
CCF: Software Uninstall RuleThis AIE rule creates an event and alerts on any software uninstallation activity across the environment.2.3NoAudit: ConfigurationInclude All Log Sources
CCF: Software VulnerabilityThis rule is intended to monitor for a vulnerability detected on a host following a software installation or update.18.8YesSecurity: VulnerabilityInclude All Log Sources
CCF: Suspicious Email AttachmentThis rule is intended to fire when a suspicious email attachment is observed, followed by a started process and network connection. 7.9YesSecurity: SuspiciousInclude All Log Sources
CCF: Time Sync Error AlarmThis AIE Rule creates an event and alerts for any time sync errors occurring on any Log Source.6.1YesOperations: WarningInclude All Log Sources
CCF: Unauthorized Executable ObservedThis rule is intended to alert when executable files that are not determined to be authorized by the organization are observed within the environment. 7.2NoOperations: Other OperationsInclude All Log Sources
CCF: User Added to Admin GroupThis rule is intended to fire with the addition of 3 or more users to a group listed in the LogRhythm list "CCF: Privileged Groups" or "CCF: Privileged Accounts."4.8YesSecurity: SuspiciousInclude All Log Sources
CCF: User Removed from Admin GroupThis rule is intended to fire with the removal of 3 or more users to a group listed in the LogRhythm list "CCF: Privileged Groups" or "CCF: Privileged Accounts."4.8YesSecurity: SuspiciousInclude All Log Sources
CCF: Vulnerability Detected AlarmThis AIE Rule alerts on the occurrence of vulnerabilities or suspicious events across the organization's environment.1.7, 3.1, 3.2, 3.6, 5.2, 8.1, 8.6, 11.3, 12.3, 12.6, 15.3, 18.8, 18.10, 18.11, 20.6YesSecurity: VulnerabilityInclude All Log Sources
CCF: Windows RunAs Privilege EscalationUser not in the LogRhythm List "Privileged Users" chooses to Run a Windows program as an administrator using the "Run as administrator" option.4.1, 4.5, 4.8, 4.9, 11.6NoSecurity : SuspiciousInclude All Log Sources

Implementation Group 3

AI Engine RulesDescriptionControl SupportAlarmingClassificationLog Sources
CCF: Abnormal Amount of Data TransferredThis rule alerts whenever a significant change (400% increase or 75% decrease) in Bytes In or Bytes Out from a specific host.16.13NoOperations : WarningInclude All Log Sources
CCF: Abnormal Auth BehaviorFirst tracks which hosts an account typically authenticates to. Afterwards, triggers when a new host or hosts are being accessed by the account.16.13YesSecurity : CompromiseInclude All Log Sources
CCF: FIM Abnormal ActivityThis AIE Rule creates events for all abnormal file integrity monitoring activity.16.13NoSecurity : SuspiciousInclude All Log Sources
CCF: Abnormal Origin LocationFirst tracks geographic locations for VPN logins. Afterwards, triggers when a new origin location is seen for a user.16.13NoSecurity : AttackInclude All Log Sources
CCF: Abnormal Process ActivityFirst tracks processes associated with a user. Afterwards, triggers if drastically different processes are observed from the user.16.13YesSecurity : MalwareInclude All Log Sources
CCF: Attack then Inbound TrafficThis rule is intended to monitor for attacks from an external source followed by traffic to or from that source.9.5, 12.7YesSecurity : AttackInclude All Log Sources
CCF: Config Change After AttackAttack event on a host followed by a configuration change made to that host within 3 minutes. 14.9NoSecurity : CompromiseInclude All Log Sources
CCF: Config Change then Critical ErrorConfiguration change followed by a critical error on the same host indicating an erroneous configuration, malicious intent or otherwise.14.9NoSecurity : CompromiseInclude All Log Sources
CCF: Config Deleted/DisabledConfiguration deleted or disabled within the organization infrastructure.   14.9NoSecurity : CompromiseInclude All Log Sources
CCF: Config ModifiedConfiguration modified within the organization infrastructure.14.9NoSecurity : CompromiseInclude All Log Sources
CCF: Early TLS/SSL AlarmThis AIE Rule alerts on the occurrence of any identified TLS LogRhythm Network Monitor event.1.8, 12.10, 13.9, 14.8, 15.8YesSecurity : ActivityInclude All Log Sources
CCF: FIM Abnormal ActivityThis AIE Rule creates events for all abnormal file integrity monitoring activity.13.3, 13.5, 14.5, 14.9NoSecurity : SuspiciousInclude All Log Sources
CCF: FIM Add ActivityThis AIE Rule creates events for all file integrity monitoring add activity.13.3, 13.5, 14.5, 14.9NoSecurity : ActivityInclude All Log Sources
CCF: FIM Delete Activity AlarmThis AIE Rule alarms on file integrity monitoring delete activity.13.3, 13.5, 14.5, 14.9YesSecurity : ActivityInclude All Log Sources
CCF: FIM General ActivityThis rule creates an event fir file integrity monitoring activity including adds, deletes, modifies, group changes, owner changes, and permissions. The FIM log source can be established from LogRhythm's FIM or other FIM solutions.13.3, 13.5, 14.5, 14.9NoOperations : InformationInclude All Log Sources
CCF: FIM InformationThis AIE Rule creates events for general file integrity monitoring information.13.3, 13.5, 14.5, 14.9NoOperations : InformationInclude All Log Sources
CCF: Multiple Failed Access AttemptsUser makes multiple failed access attempts within a short time period. CIS Critical Security Control(s): CSC 16.813.3, 13.5, 14.5, 14.9NoSecurity : SuspiciousInclude All Log Sources
CCF: Multiple Object Access FailuresMultiple users failed to access the same file. CIS Critical Security Control(s): CSC 16.813.3, 13.5, 14.5, 14.9NoSecurity : SuspiciousInclude All Log Sources
CCF: New Process and Traffic DestinationFirst, a process that normally doesn't run on the source host is started. Next, network traffic is generated from that process going to a host that the source doesn't normally communicate with.9.5, 12.7NoSecurity : SuspiciousInclude All Log Sources
CCF: Non-Encrypted Protocol AlarmThis investigation provides details of unencrypted applications being utilized within the critical and production systems or environments (entity structure).1.8, 12.10, 13.9, 14.8, 15.8YesOperations : InformationInclude All Log Sources
CCF: Port Misuse: 53This rule is triggered by network traffic not using DNS over the common DNS port (53). 12.2, 18.10YesSecurity: SuspiciousInclude All Log Sources
CCF: Port Misuse: 80This rule is intended to fire when traffic is seen not using HTTP over the common HTTP port (80). 12.2, 18.10YesSecurity: SuspiciousInclude All Log Sources
CCF: Significant Outbound Traffic IncreaseMeasures the rate of outbound traffic from a host and generates an event if that rate increases.9.5, 12.7NoSecurity : SuspiciousInclude All Log Sources
CCF: Software Install RuleThis AIE rule creates an event and alerts on any software installation activity across the environment.2.7NoAudit: ConfigurationInclude All Log Sources
CCF: Software Uninstall Failure AlarmThis alerts on failed or interrupted software uninstallations.2.7YesAudit : ConfigurationInclude All Log Sources
CCF: Software Uninstall RuleThis AIE rule creates an event and alerts on any software uninstallation activity across the environment.2.7NoAudit: ConfigurationInclude All Log Sources
CCF: Suspicious Email AttachmentThis rule is intended to fire when a suspicious email attachment is observed, followed by a started process and network connection. 7.9YesSecurity: SuspiciousInclude All Log Sources
CCF: Unauthorized Data TransferThis rule is configured to monitor any amount of data transferred from log sources contained within the CCF: Data Storage Systems list.13.1, 13.2NoOperations: Network TrafficInclude All Log Sources
CCF: Unauthorized Executable ObservedThis rule is intended to alert when executable files that are not determined to be authorized by the organization are observed within the environment. 7.2NoOperations: Other OperationsInclude All Log Sources
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.