heroui logo

Windows Detect Network Scanner Behavior

Splunk Security Content

View Source
Summary
The 'Windows Detect Network Scanner Behavior' analytic aims to identify suspicious application activity indicative of network scanning behavior. This technique is crucial for detecting potential reconnaissance efforts by adversaries looking to discover hosts and services within a network, facilitating lateral movement or execution of further attacks. The rule leverages Sysmon EventID 3 to capture network connections, particularly focusing on applications connecting to a high number of unique ports or destinations within a brief timespan. Such activities can result in a noisy environment, thus the rule necessitates careful tuning when implemented in a real-world scenario. Key emphasis is on filtering out common, non-malicious ports to reduce false positives and ensure that alerts are meaningful. It is essential to pre-populate the filter macro prior to activation to enhance detection accuracy and reduce noise. The implementation of this rule requires Sysmon logs to be properly ingested and tagged within the relevant data model in Splunk, allowing the detection logic to function as intended.
Categories
  • Windows
  • Network
  • Endpoint
Data Sources
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1595
  • T1595.001
  • T1595.002
Created: 2025-01-09