Skip to main content
Skip table of contents

Healthcare (OT) - AIE Rule Configuration

AI Engine Rule NameDescriptionRule Block Summary
HC: Account Added to Privileged GroupObserves for an account added to an admin/privileged user groupPrimary Criteria

Common Event Is : Account Added To Group

     and Group Is : Privileged Groups


Log SourcesAll Log Sources
Group By

User (Origin)

Group

User (Impacted)

AI Engine Rule NameDescriptionRule Block Summary

HC: Admin Password ModifiedObserves for an admin/privileged user password modificationPrimary Criteria

Common Event Is : Password Modified

     and User (Impacted) Is : HC: Privileged Users



Log SourcesAll Log Sources
Group By

User (Origin)

User (Impacted)

AI Engine Rule NameDescriptionRule Block Summary

HC: Crit Application Config ChangeObserves for changes to critical application configurationsPrimary Criteria

Common Event Is : Configuration Modified : Application

                               Configuration Deleted : Application

                               Configuration Enabled : Application

                               Configuration Loaded : Application



Log SourcesAll Log Sources
Group By

Process Name

Host (Impacted)

AI Engine Rule NameDescriptionRule Block Summary

HC: Crit Backup FailureObserves for failed critical backup eventsPrimary Criteria

Common Event Is : Backup Failed

                               Backup Falure





Log SourcesAll Log Sources
Group ByHost (Impacted)
AI Engine Rule NameDescriptionRule Block Summary

HC: Crit Database Config ChangeObserves for changes to critical database configurationsPrimary Criteria

Common Event Is : Configuration Deleted : Database

                               Configuration Disabled : Database

                               Configuration Modified : Database

                               Configuration Enabled : Database

                               Configuration Loaded : Database





Log SourcesAll Log Sources
Group By

Host (Impacted)

Object

AI Engine Rule NameDescriptionRule Block Summary

HC: Crit Net Access Config ChangeObserves for changes to critical network access configurationsPrimary Criteria

Common Event Is : Configuration Deleted : Network Access

                               Configuration Disabled : Network Access

                               Configuration Modified : Network Access

                               Configuration Enabled : Network Access

                               Configuration Loaded : Network Access





Log SourcesAll Log Sources
Group ByHost (Impacted)
AI Engine Rule NameDescriptionRule Block Summary

HC: Crit Service StoppedObserves for critical service stop events that are not followed by service start eventsPrimary Criteria

Common Event Is : Process/Service Stopped

                               Process/Service Stopping

                               Service Shutdown





Log SourcesAll Log Sources
Group By

Host (Impacted)

Process Name

AI Engine Rule NameDescriptionRule Block Summary

HC: Crit System Config ChangeObserves for changes to critical system configurationsPrimary Criteria

Common Event Is : Configuration Deleted: System

                               Configuration Disabled : System

                               Configuration Modified : System

                               Configuration Enabled : System

                               Configuration Loaded : System





Log SourcesAll Log Sources
Group ByHost (Impacted)
AI Engine Rule NameDescriptionRule Block Summary

HC: Crit System ShutdownObserves for critical system shutdowns that are not followed by startup activityPrimary Criteria

Common Event Is : System Restarting

                               System Shutdown

                               System Shutting Down





Log SourcesAll Log Sources
Group ByHost (Impacted)
AI Engine Rule NameDescriptionRule Block Summary

HC: Data Copy To Removable DeviceObserves for data transfer to a removable device (e.g., USB drive)Primary Criteria

Rule Block 1:

          Log Source Type Is : LogRhythm Data Loss Defender

               and MPE Rule Name Is : CONNECTED - CDRom

                                                      CONNECTED - Removable

Rule Block 2:

          Log Source Type Is : LogRhythm Data Loss Defender

               and MPE Rule Name Is : DATACOPY - Removable/CDRom





Log Sources

Rule Block 1: All Log Sources

Rule Block 2: All Log Sources

Group By

Rule Block 1:

          User (Origin)

          Common Event

Rule Block 2:

          User (Origin)

          Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Default Or Weak PasswordObserves for a default or weak passwordPrimary Criteria

Common Event Is : Vuln Low Severity : Default Password

                               Vuln Medium Severity : Default Password

                               Vuln High Severity : Default Password

                               Password Too Short





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Device ModifiedObserves for device modificationsPrimary Criteria

Log Source Type Is : Syslog - Ordr SCE

     and Common Event Is : Object Modified





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Device Sent Plaintext CredentialsObserves for device transmission of a plaintext passwordPrimary Criteria

Log Source Type Is : Syslog - Medigate CEF

     and Common Event Is : Vuln High Severity : General





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Device Software VulnerabilityObserves for device software vulnerabilitiesPrimary Criteria

Log Source Type Is : Syslog - Ordr SCE

     and Common Event Is : Vuln Low Severity : General





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Door Access GrantedObserves for successful door authenticationsPrimary Criteria

Log Source Type Is : Flat File - S2 Badge Reader

                                 Flat File - KERISYS Doors Event Export Format

     and Common Event Is : Object Accessed

                                           Door Access Granted





Log SourcesAll Log Sources
Group By

Classification

User (Origin)

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Expired CertificateObserves for an expired TLS certificatePrimary Criteria

Log Source Type Is : Syslog - Medigate

                                 Syslog - Ordr SCE





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: File Deletion ActivityObserves for file deletionsPrimary Criteria

Common Event Is : File Deleted

                               File Monitoring Event - Delete





Log SourcesAll Log Sources
Group By

User (Origin)

Host (Impacted)

Object

AI Engine Rule NameDescriptionRule Block Summary

HC: Firmware ChangeObserves for device firmware changesPrimary Criteria

Log Source Type Is : Syslog - Medigate

     and Common Event Is : Upgrade Information





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Malicious IPObserves for device communication with a destination IP flagged as potentially maliciousPrimary Criteria

Log Source Type Is : Syslog - Ordr SCE

                                 Syslog - Medigate CEF

     and Common Event Is : Bad IP Reputation





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Multiple Account LockoutsObserves for an account locked out multiple times (>=3) per hourPrimary Criteria

Common Event Is : Account Locked

                               User Logon Failure : Account Locked Out


Log SourcesAll Log Sources
Group By

User (Impacted)

Log Source

Common Event

ThresholdsLog Count >=3
AI Engine Rule NameDescriptionRule Block Summary

HC: Multiple Door Access FailuresObserves for multiple failed door authenticationsPrimary Criteria

Log Source Type Is : Flat File - S2 Badge Reader

                                 Flat File - KERISYS Doors Event Export Format

                                 UDLA - Symmetry Access Control

     and Common Event Is : Access Object Failure







Log SourcesAll Log Sources
Group By

Classification

Common Event

ThresholdsLog Count >=3
AI Engine Rule NameDescriptionRule Block Summary

HC: New Hardware DetectedObserves for connection of a new external device (e.g., USB drive, keyboard, mouse) to a systemPrimary Criteria

Common Event Is : New Device Found

                               Hardware Installed

                               Object Initialized

                               General Device Manager Message





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: New Medical DeviceObserves for a newly discovered medical device (e.g., infusion pump)Primary Criteria

Log Source Type Is : Syslog - Ordr SCE

                                 Syslog - Medigate

     and Common Event Is : New Device Found

                                           Object Created





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Sensor Connected/DisconnectedObserves for sensor connections/disconnectionsPrimary Criteria

Log Source Type Is : Syslog - Ordr SCE

     and Common Event Is : Interface Connected

                                           Interface Disconnected





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: SMBv1 CommunicationObserves for device communication over SMBv1Primary Criteria

Log Source Type Is : Syslog - Medigate

     and Common Event Is : SMB Session Created





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Software Install/Update FailureObserves for failed software installations/updatesPrimary Criteria

Common Event Is : Install Failed

                               Software Installation Failed

                               Software Update Failed

                               Update Failed





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: Software Installed/UpdatedObserves for successful software installations/updatesPrimary Criteria

Common Event Is : Software Installed

                               Software Updated

                               Update Successful





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: System Time ChangedObserves for system time changesPrimary Criteria

Common Event : Session Setting Changed

                            Time Adjusted

                            System Time Updated





Log SourcesAll Log Sources
Group By

Classification

Common Event

AI Engine Rule NameDescriptionRule Block Summary

HC: User Account CreatedObserves for creation of a new user accountPrimary CriteriaClassification Is : Account Created




Log SourcesAll Log Sources
Group By

User (Origin)

Host (Impacted)

AI Engine Rule NameDescriptionRule Block Summary

HC: Vulnerability Scan EventObserves for vulnerability scansPrimary Criteria

Log Source Type Is : Syslog - Ordr SCE

     Common Event Is : Scan Started

                                    Scan Stopped





Log SourcesAll Log Sources
Group By

Classification

Common Event

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.