GDPR – AI Engine Rules
AI Engine Rule Name | Rule Description | Alert | Rule ID | Notification Area | Corresponding Investigation | Directly Meet Requirements | Log Sources |
---|---|---|---|---|---|---|---|
CCF: Abnormal Amount of Data Transferred | This rule alerts whenever a significant change (400% increase or 75% decrease) in Bytes In or Bytes Out from a specific host. | N/A | 1230 | Operations : Warning | N/A | N/A | GDPR: All Log Sources |
CCF: Abnormal Origin Location | First tracks geographic locations for VPN logins. Afterwards, triggers when a new origin location is seen for a user. | N/A | 1208 | Security : Attack | N/A | N/A | GDPR: All Log Sources |
CCF: Attack then External Connection | An observed external attack or compromise followed by data leaving the system and going to the attacker. | N/A | 1211 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Auth After Numerous Failed Auths | Multiple external unique login attempts are seen on the same impacted host within a short period of time, followed by a successful authentication. | Yes | 1199 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Auth After Security Event | An observed attack, compromise, or other security event followed by successful access or authentication from the attacking host. | No | 1200 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Backup Failure Alarm | More than 10 backup failure events are detected. | Yes | 1236 | Operations : Error | CCF: Backup Activity Inv | N/A | GDPR: All Log Sources |
CCF: Backup Information | This AIE Rule creates events for information from backup software. | No | 1237 | Operations : Information | CCF: Backup Activity Inv | N/A | GDPR: All Log Sources |
CCF: Blacklist Location Auth | Authentication success from a blacklisted location. | No | 1204 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Concurrent VPN from Multiple Locations | Multiple VPN authentication successes from the same origin login are observed from different regions within a given time period (default 3 hours). | No | 1205 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Config Change After Attack | Attack event on a host followed by a configuration change made to that host within 3 minutes. | No | 1214 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Config Change then Critical Error | Configuration change followed by a critical error on the same host indicating an erroneous configuration, malicious intent or otherwise. | No | 1216 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Config Deleted/Disabled | Configuration deleted within the organization infrastructure. | No | 1219 | Security : Compromise | CCF: Config/Policy Change Inv | N/A | CCF: Production Servers |
CCF: Config Modified | Configuration modified within the organization infrastructure. | No | 1221 | Security : Compromise | CCF: Config/Policy Change Inv | N/A | GDPR: All Log Sources |
CCF: Corroborated Account Anomalies | 3 or more unique behavioral anomalies for a given user within a 3 hour period. This rule requires Rule IDs 285 - 289 be turned on. | No | 1207 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Corroborated Data Access Anomalies | 2 or more unique behavioral anomalies for data within a 3 hour periods. The alarm requires rule IDs 300-302 be turned on in order for this alarm to trigger. | No | 1201 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Critical Event After Attack | An external attack or compromise followed by a critical event on the same host. | No | 1206 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Critical/PRD Envir Config/Policy Change Alarm | This AIE rule creates an alert any time a configuration or policy modification logs are received from a critical or production environment (entity structure). | Yes | 1210 | Audit : Policy | CCF: Config/Policy Change Inv | N/A | CCF: Production Servers |
CCF: Critical/PRD Envir Patch Failure Alarm | This AIE rule creates an alert any time a patch fails to apply to the critical or production environments (entity structure). | Yes | 1212 | Operations : Error | CCF: Critical Environment Error Inv | N/A | GDPR: All Log Sources |
CCF: Critical/PRD Envir Signature Failure Alarm | This AIE Rule creates an alert on signature update failures on critical or production environments (entity structure). | Yes | 1213 | Operations : Error | CCF: Critical Environment Error Inv | N/A | GDPR: All Log Sources |
CCF: Data Destruction | Attack event followed by a FIM delete/modify event on the same host. | No | 1202 | Security : Compromise | CCF: LogRhythm Data Loss Defender Log Inv | N/A | GDPR: All Log Sources |
CCF: Data Exfiltration Observed | External attack or compromise followed by data leaving the same system. | No | 1193 | Security : Compromise | CCF: LogRhythm Data Loss Defender Log Inv | N/A | GDPR: All Log Sources |
CCF: Data Loss Prevention | This AIE Rule provides details of data generated by the LogRhythm Data Loss Defender or other data loss prevention solutions, when configured. | No | 1232 | Operations : Information | CCF: LogRhythm Data Loss Defender Log Inv | N/A | GDPR: All Log Sources |
CCF: Disabled Account Auth Success | Recently disabled or deleted account authenticates or accesses resources on the network. | No | 1194 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Distributed Brute Force | A successful brute force authentication -- multiple failed authentication attempts from different external hosts to the same host using the same origin login, followed by an authentication success. | No | 1203 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Early TLS/SSL Alarm | This AIE Rule alerts on the occurrence of any identified TLS LogRhythm Network Monitor event. | Yes | 1238 | Security : Activity | N/A | N/A | GDPR: All Log Sources |
CCF: External Brute Force Auths | Successful authentication after multiple failed attempts from different external origin hosts to the same impacted host. | No | 1197 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: FIM Abnormal Activity | This AIE Rule creates events for all abnormal file integrity monitoring activity. | No | 1233 | Security : Suspicious | N/A | N/A | GDPR: All Log Sources |
CCF: FIM Add Activity | This AIE Rule creates events for all file integrity monitoring add activity. | No | 1234 | Security : Activity | N/A | N/A | GDPR: All Log Sources |
CCF: FIM Delete Activity Alarm | This AIE Rule alarms on file integrity monitoring delete activity. | Yes | 1235 | Security : Activity | N/A | N/A | GDPR: All Log Sources |
CCF: FIM General Activity | This rule creates an event fir file integrity monitoring activity including adds, deletes, modifies, group changes, owner changes, and permissions. The FIM log source can be established from LogRhythm's FIM or other FIM solutions. | No | 1239 | Operations : Information | N/A | N/A | GDPR: All Log Sources |
CCF: FIM Information | This AIE Rule creates events for general file integrity monitoring information. | No | 1229 | Operations : Information | N/A | N/A | GDPR: All Log Sources |
CCF: GeoIP Blacklisted Region Activity | This rule tracks activity associated with Blacklisted Regions (list). | No | 1241 | Security : Suspicious | CCF: GeoIP Inv | N/A | GDPR: All Log Sources |
CCF: GeoIP General Activity | This rule is designed to use with the Data Processor's GeoIP functionality, to represent general GeoIP activity. | No | 1240 | Security : Suspicious | CCF: GeoIP Inv | N/A | GDPR: All Log Sources |
CCF: Large Outbound Transfer | Single host is seen sending over 1GB of data within 30 minutes out of the network. | No | 1195 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: Local Account Created and Used | An account is created on a host and then used shortly thereafter on the same host. | No | 1196 | Security : Compromise | N/A | N/A | GDPR: All Log Sources |
CCF: LogRhythm Silent Log Source Error Alarm | This AIE Rule creates an alert and provides information when a LogRhythm Log Source has "not received logs from a critical or production server-system during the defined error period. | Yes | 1209 | Operations : Warning | N/A | N/A | GDPR: All Log Sources |
CCF: Malware Alarm | This AIE Rule provides details on malware activity across the organization's environment where malware detection/prevention is applied. | Yes | 1217 | Security : Malware | CCF: Malware Detected Inv | N/A | GDPR: All Log Sources |
CCF: Misuse | This AIE Rule provides details on misuse activity. | No | 1231 | Security : Misuse | CCF: User Misuse Inv | N/A | GDPR: All Log Sources |
CCF: Non-Encrypted Protocol Alarm | This investigation provides details of unencrypted applications being utilized within the critical and production systems or environments (entity structure). | Yes | 1222 | Operations : Information | CCF: Use Of Non-Encrypted Protocols Inv | N/A | GDPR: All Log Sources |
CCF: Rogue Access Point Alarm | This AIE Rule alerts on the occurrence of any rogue access point detection events against the organization's environment. | Yes | 1220 | Security : Suspicious | CCF: Rogue Access Point Inv | N/A | GDPR: All Log Sources |
CCF: Social Media Event | This rule tracks social media activity, to help identify if private or personal data that should not be in transmission is present within the environment's traffic. | No | 1242 | Security : Suspicious | CCF: Social Media Inv | N/A | GDPR: All Log Sources |
CCF: Suspected Wireless Attack Alarm | This AIE Rule creates an event and alerts on suspected wireless attacks (success/failure) against the boundary monitoring devices. | Yes | 1223 | Security : Attack | CCF: Suspected Wireless Attack Inv | N/A | CCF: Wireless IDS |
CCF: Time Sync Error Alarm | This AIE Rule creates an event and alerts for any time sync errors occurring on any Log Source. | Yes | 1215 | Operations : Warning | CCF: Time Sync Error Inv | N/A | GDPR: All Log Sources |
CCF: Unknown User Account Alarm | This rule identifies activity originating from unknown user accounts, based off of the CCF user lists. | Yes | 1243 | Security : Suspicious | CCF: Unknown User Account Inv | N/A | GDPR: All Log Sources |
CCF: Vulnerability Detected Alarm | This AIE Rule alerts on the occurrence of vulnerabilities or suspicious events across the organization's environment. | Yes | 1218 | Security : Vulnerability | CCF: Vulnerability Detected Inv | N/A | GDPR: All Log Sources |