Unauthorized Machine Access
Unauthorized Machine Access (Windows/Mac)
The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: UNAUTHORIZED MACHINE ACCESS.
| 
                                                         ALERT RULE  | 
                                                    
                                                         Description  | 
                                                
|---|---|
| Connecting to a new FTP or SFTP server using FTP application | 
                                                         An alert is triggered upon using an FTP application and connecting to a remote FTP or SFTP server.  | 
                                                
| Connecting to a sensitive Mac machine using Screen Sharing | 
                                                         An alert is triggered upon trying to connect to a sensitive remote Mac machine using Mac's built-in Screen Sharing mechanism.  | 
                                                
| Connecting to a sensitive server using Finder on Mac | 
                                                         An alert is triggered upon trying to connect to a remote server that is part of the Sensitive Remote Servers list using Finder on Mac (the equivalent to Windows Explorer on Windows).  | 
                                                
| Connecting to a sensitive server using FTP applications | 
                                                         An alert is triggered upon using an FTP client on Windows or Mac and connecting to a remote server that is part of the Sensitive Remote Servers list.  | 
                                                
| Connecting to a sensitive VMWare VsPhere client | 
                                                         An alert is triggered upon trying to type the name or IP of sensitive machine in order to connect to a VMWare VsPhere Client.  | 
                                                
| Connecting to a sensitive Windows server from Mac | 
                                                         An alert is triggered upon trying to connect to Windows server that is part of a Sensitive Remote Servers list, while doing it from Mac using Microsoft Remote Desktop application.  | 
                                                
| Interacting with remote machines using PowerShell commands | 
                                                         An alert is triggered upon opening PowerShell and invoking specific commands that are used for interacting with remote machines.  | 
                                                
| Logging in locally to sensitive Windows Desktop by unauthorized user | 
                                                         An alert is triggered upon local login (accessing the machine physically) to a predefined sensitive Windows desktop, by a user not included in the authorized users list for these sensitive machines.  | 
                                                
| Logging in locally to sensitive Windows Server by unauthorized user | 
                                                         ACTION REQUIRED: Add users black/white list (authorized/unauthorized) in the WHO statement. An alert is triggered upon local login (accessing the machine physically) to a predefined sensitive Windows server, by an unauthorized user.  | 
                                                
| Logging in remotely (RDP) to sensitive Windows Server from unauthorized client | 
                                                         An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows server from a client not included in the list of authorized client IPs or client names for these sensitive machines.  | 
                                                
| Logging in remotely (RDP) to sensitive Windows Desktop by unauthorized user | 
                                                         ACTION REQUIRED: Add users black/white list (Authorized/Unauthorized) in the WHO statement. An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows desktop by a user not included in the predefined list.  | 
                                                
| Logging in remotely (RDP) to sensitive Windows Desktop from unauthorized client | 
                                                         An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows desktop from a client not included in the list of authorized client IPs or client names for these sensitive machines.  | 
                                                
| Logging in remotely (RDP) to sensitive Windows Server by unauthorized user | 
                                                         ACTION REQUIRED: Add users black/white list (authorized/unauthorized) in the WHO statement. An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows server by an unauthorized user.  | 
                                                
| Logging in remotely (RDP) to sensitive Windows Server during irregular hours | 
                                                         An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows server during irregular hours (before the beginning or after the end of a working weekday, or during weekend).  | 
                                                
| Logging in to any machine by disabled users (ex-employees) | 
                                                         This alert will be triggered upon login to any type of machine (Win, Mac, Unix, Linux) of users who are part of the list Disabled Users (ex-employees whose account in Active Directory should have been disabled).  | 
                                                
| Logging in to sensitive machine using a shared account | 
                                                         An alert is triggered when Secondary Authentication mode was used while the user was logged in to this machine, indicating that the primary user name was probably a shared account (e.g., Administrator).  | 
                                                
| Logging in with the default built-in privileged account to sensitive servers | 
                                                         An alert is triggered upon logging in to sensitive remote servers with the default privileged accounts of Administrator or root.  | 
                                                
| Running a remote PC access tool to access a remote machine | 
                                                         An alert is triggered upon running a remote login utility in order to take control over a remote machine, or to open a telnet/SSH session on a remote machine.  | 
                                                
| 
                                                         Taking control on remote machine from Mac Note: This rule applies specifically on Mac systems.  | 
                                                    
                                                         An alert is triggered upon opening a Terminal application on Mac and running SSH to take control over a remote machine.  | 
                                                
Unauthorized Machine Access (Unix/Linux)
The following out-of-the-box alert rules are assigned to the (Unix/Linux) Category: UNAUTHORIZED MACHINE ACCESS.
| 
                                                         ALERT RULE  | 
                                                    
                                                         Description  | 
                                                
|---|---|
| Leapfrogging with identity change 1 | 
                                                         An alert is triggered upon opening a new SSH session with an identity change which could indicate an account misuse. Note: This is rule 1 out of 2 rules for this scenario.  | 
                                                
| Leapfrogging with identity change 2 | 
                                                         An alert is triggered upon opening a new SSH session with an identity change which could indicate an account misuse. Note: This is rule 2 out of 2 rules for this scenario.  | 
                                                
| Logging in remotely to sensitive Unix or Linux machine from unauthorized client | 
                                                         An alert is triggered upon detecting a new login to a sensitive machine from a remote unauthorized client IP. The alert applies when the agent is installed on the machine that is being controlled (i.e., not on the controlling machine).  |