
Summary
The rule "Unusual Linux Network Configuration Discovery" is designed to detect irregular commands related to system network configuration executed by atypical user accounts. Utilizing machine learning, it monitors for commands that suggest network mapping and information gathering which can be characteristic of either administrative troubleshooting or a compromised account being exploited by threat actors. The rule aims to identify such anomalies over a designated interval and raises alerts when the likelihood of unusual behavior exceeds a predefined anomaly threshold. False positives may occur due to normal administrative activities or automated scripts, so alert triage and investigation are critical. A thorough review of user behavior and session history is necessary for proper context, and if suspicious activity is confirmed, appropriate remediation steps should be undertaken to contain or remediate any potential threats.
Categories
- Endpoint
- Linux
Data Sources
- Script
- Logon Session
- Network Traffic
- Process
ATT&CK Techniques
- T1016
Created: 2020-09-03