heroui logo

Zscaler Malware Activity Threat Blocked

Splunk Security Content

View Source
Summary
The Zscaler Malware Activity Threat Blocked rule is designed to detect potential malware activities on a network by analyzing web proxy logs provided by Zscaler. The rule identifies instances where actions were blocked due to malware threats, using criteria that include the action being 'blocked', a threatname associated with malware, and a filter to exclude non-threatening categories. The aggregation of such blocked actions is performed by user, URL category, and threat category, facilitating a clear overview of potential malicious activity. This detection plays a crucial role in Security Operations Center (SOC) efforts, especially since any confirmed malicious activity could indicate attempts to compromise the network and the need for immediate investigative measures. The implementation of this rule requires appropriate ingestion of Zscaler logs into the Splunk environment, ensuring the data is ready for analysis.
Categories
  • Web
  • Cloud
  • Network
Data Sources
  • Web Credential
  • Logon Session
  • Network Traffic
ATT&CK Techniques
  • T1566
Created: 2024-11-15