Unauthorized Machine Access

Unauthorized Machine Access (Windows/Mac)

The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: UNAUTHORIZED MACHINE ACCESS.

ALERT RULE

Description

Connecting to a new FTP or SFTP server using FTP application

An alert is triggered upon using an FTP application and connecting to a remote FTP or SFTP server.

Connecting to a sensitive Mac machine using Screen Sharing

An alert is triggered upon trying to connect to a sensitive remote Mac machine using Mac's built-in Screen Sharing mechanism.

Connecting to a sensitive server using Finder on Mac

An alert is triggered upon trying to connect to a remote server that is part of the Sensitive Remote Servers list using Finder on Mac (the equivalent to Windows Explorer on Windows).

Connecting to a sensitive server using FTP applications

An alert is triggered upon using an FTP client on Windows or Mac and connecting to a remote server that is part of the Sensitive Remote Servers list.

Connecting to a sensitive VMWare VsPhere client

An alert is triggered upon trying to type the name or IP of sensitive machine in order to connect to a VMWare VsPhere Client.

Connecting to a sensitive Windows server from Mac

An alert is triggered upon trying to connect to Windows server that is part of a Sensitive Remote Servers list, while doing it from Mac using Microsoft Remote Desktop application.

Interacting with remote machines using PowerShell commands

An alert is triggered upon opening PowerShell and invoking specific commands that are used for interacting with remote machines.

Logging in locally to sensitive Windows Desktop by unauthorized user

An alert is triggered upon local login (accessing the machine physically) to a predefined sensitive Windows desktop, by a user not included in the authorized users list for these sensitive machines.

Logging in locally to sensitive Windows Server by unauthorized user

ACTION REQUIRED: Add users black/white list (authorized/unauthorized) in the WHO statement.

An alert is triggered upon local login (accessing the machine physically) to a predefined sensitive Windows server, by an unauthorized user.

Logging in remotely (RDP) to sensitive Windows Server from unauthorized client

An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows server from a client not included in the list of authorized client IPs or client names for these sensitive machines.

Logging in remotely (RDP) to sensitive Windows Desktop by unauthorized user

ACTION REQUIRED: Add users black/white list (Authorized/Unauthorized) in the WHO statement.

An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows desktop by a user not included in the predefined list.

Logging in remotely (RDP) to sensitive Windows Desktop from unauthorized client

An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows desktop from a client not included in the list of authorized client IPs or client names for these sensitive machines.

Logging in remotely (RDP) to sensitive Windows Server by unauthorized user

ACTION REQUIRED: Add users black/white list (authorized/unauthorized) in the WHO statement.

An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows server by an unauthorized user.

Logging in remotely (RDP) to sensitive Windows Server during irregular hours

An alert is triggered upon remote login (via RDP session) to a predefined sensitive Windows server during irregular hours (before the beginning or after the end of a working weekday, or during weekend).

Logging in to any machine by disabled users (ex-employees)

This alert will be triggered upon login to any type of machine (Win, Mac, Unix, Linux) of users who are part of the list Disabled Users (ex-employees whose account in Active Directory should have been disabled).

Logging in to sensitive machine using a shared account

An alert is triggered when Secondary Authentication mode was used while the user was logged in to this machine, indicating that the primary user name was probably a shared account (e.g., Administrator).

Logging in with the default built-in privileged account to sensitive servers

An alert is triggered upon logging in to sensitive remote servers with the default privileged accounts of Administrator or root.

Running a remote PC access tool to access a remote machine

An alert is triggered upon running a remote login utility in order to take control over a remote machine, or to open a telnet/SSH session on a remote machine.

Taking control on remote machine from Mac

Note: This rule applies specifically on Mac systems.

An alert is triggered upon opening a Terminal application on Mac and running SSH to take control over a remote machine.

Unauthorized Machine Access (Unix/Linux)

The following out-of-the-box alert rules are assigned to the (Unix/Linux) Category: UNAUTHORIZED MACHINE ACCESS.

ALERT RULE

Description

Leapfrogging with identity change 1

An alert is triggered upon opening a new SSH session with an identity change which could indicate an account misuse.

Note: This is rule 1 out of 2 rules for this scenario.

Leapfrogging with identity change 2

An alert is triggered upon opening a new SSH session with an identity change which could indicate an account misuse.

Note: This is rule 2 out of 2 rules for this scenario.

Logging in remotely to sensitive Unix or Linux machine from unauthorized client

An alert is triggered upon detecting a new login to a sensitive machine from a remote unauthorized client IP. The alert applies when the agent is installed on the machine that is being controlled (i.e., not on the controlling machine).