heroui logo

Cisco Secure Firewall - High Priority Intrusion Classification

Splunk Security Content

View Source
Summary
The Cisco Secure Firewall - High Priority Intrusion Classification analytic rule detects high-severity intrusion events classified by Snort rules within Cisco Secure Firewall logs. The rule specifically looks for events classified as network trojans, successful privilege gains, default username/password login attempts, command and control traffic, malicious file exploits, and client-side exploit attempts, indicating serious threats like remote code execution and credential theft. This rule encourages immediate investigation of detected classifications due to their potential impact on network security. Effective implementation requires specific configurations in Splunk for processing logs from Cisco Secure Firewall Threat Defense, ensuring the appropriate analysis of high-risk events.
Categories
  • Network
  • Endpoint
  • Infrastructure
Data Sources
  • Pod
  • Container
  • User Account
ATT&CK Techniques
  • T1203
  • T1003
  • T1071
  • T1190
  • T1078
Created: 2025-04-28