Alert Rule Categories
ObserveIT’s library of rule scenarios are grouped by security categories to help navigation and facilitate their operation and maintenance.
Categories apply to Windows, Mac, or Unix/Linux systems; some are relevant for all systems.
In addition to the built-in categories, you can create new security categories. You can also unassign rules from categories, and reassign them.
The following table lists the alert rule categories with an indication of which operating systems they apply to. To see details about the rules that apply to each category, click the relevant √ indication.
Category |
Windows/Mac |
Unix/Linux |
---|---|---|
Data Exfiltration | ||
Data Infiltration (Bringing in Troubles) | ||
Hiding Information and Covering Tracks | ||
Unauthorized Machine Access | ||
Unauthorized Data Access |
|
|
Bypassing Security Controls |
|
|
Unacceptable Use |
|
|
Careless Behavior | ||
Creating Backdoor | ||
Time Fraud |
|
|
Unauthorized Activity on Servers |
|
|
Running Malicious Software | ||
Performing Unauthorized Admin Tasks |
√ |
√ |
Copyright Infringement |
|
|
Searching for Information |
|
|
Using Unauthorized Communication Tools |
|
|
Installing/Uninstalling Questionable Software |
|
|
Unauthorized Active Directory Activity |
|
|
Unauthorized DBA Activity |
|
|
Shell Attack |
|
|
Preparation for Attack |
|
|
Unauthorized Shell Opening |
|
|
IT Sabotage |
|
|
Performing Privilege Elevation |
|
|
Identity Theft |
|
|
System Tampering |
|
|
Messing with ObserveIT Components | ||
GIT Suspicious Activity | ||
Docker and Containers Suspicious Activity |
|