
Summary
This analytics rule detects significant increases in data transfers from email servers to client hosts by utilizing the Network_Traffic data model in Splunk. It employs statistical methods to identify anomalies based on daily outbound traffic metrics, specifically looking for traffic that exceeds the established average plus a defined number of standard deviations. This detection method is critical for recognizing possible data exfiltration attempts facilitated through email services, suggesting that a malicious actor may be leveraging the email infrastructure to gain unauthorized access to sensitive information. The rule requires configuration to ensure that email servers are correctly categorized within the data model and can be adjusted according to the network behavior observed.
Categories
- Network
Data Sources
- Network Traffic
ATT&CK Techniques
- T1114
- T1114.002
Created: 2025-01-21