heroui logo

Anonymous IP Address

Sigma Rules

View Source
Summary
This detection rule identifies sign-in attempts from anonymous IP addresses, which may indicate potential security threats associated with credential access. Anonymous IP addresses can be used by attackers employing VPNs or tor-like services to mask their true location, thus evading traditional security measures. The rule focuses on events logged when a sign-in occurs from an IP known for anonymity. By monitoring these sign-in attempts, security teams can proactively investigate the sessions and assess whether they pose a risk to organizational resources. The background context provided suggests that these are high-risk cases, necessitating thorough review during incidents associated with credential access. Proper investigation tools and protocols should be in place to validate whether these logins are legitimate user activities or potentially harmful attempts to infiltrate the system.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • User Account
  • Logon Session
  • Network Traffic
Created: 2023-08-22