SlideShare a Scribd company logo
1 of 33
Download to read offline
HPE SecurityĀ ArcSightĀ ESM:
Reconnaissance
Software Version: 1.0
Security Use Case Guide
April 3, 2017
Legal Notices
Warranty
The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
The information contained herein is subject to change without notice.
The network information used in the examples in this document (including IP addresses and hostnames) is for illustration
purposes only.
HPE Security ArcSight products are highly flexible and function as you configure them. The accessibility, integrity, and
confidentiality of your data is your responsibility. Implement a comprehensive security strategy and follow good security
practices.
This document is confidential.
Restricted Rights Legend
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use or copying.
Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical
Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
Copyright Notice
Ā© Copyright 2016 Hewlett Packard Enterprise Development, LP
Follow this link to see a complete statement of copyrights and acknowledgements:
https://www.protect724.hpe.com/docs/DOC-13026
Support
Phone Alistof phone numbers is available on the HPE Security ArcSightTechnical Support
Page:Ā https://softwaresupport.hpe.com/documents/10180/14684/esp-support-
contact-list
Support Web Site https://softwaresupport.hpe.com
Protect 724 Community https://www.protect724.hpe.com
Contact Information
Security Use Case Guide
HPE ESM: Reconnaissance 1.0 Page 2 of 33
Contents
Chapter 1: Overview 4
Chapter 2: Installation 6
Importing and Installing a Package 7
Assigning User Permissions 8
Chapter 3: Configuration 9
Chapter 4: Getting Started with the Reconnaissance Monitoring Dashboard 11
Chapter 5: Monitoring the Reconnaissance Activity Active Channel 13
Chapter 6: Monitoring Internal Scanners 15
Using the Internal Scanner Activity Data Monitor 15
Using the Top Traffic from Internal Scanners Data Monitor 18
Chapter 7: Monitoring Scanned Hosts 22
Using the Critical Hosts Scanned Data Monitor 22
Using the Top Critical Hosts Scanned by External Source Data Monitor 25
Using the Top Internal Scanned Hosts Data Monitor 28
Chapter 8: Refining the Reconnaissance from Internal Sources Rule 31
Send Documentation Feedback 33
HPE ESM: Reconnaissance 1.0 Page 3 of 33
Chapter 1: Overview
Reconnaissance is an information-gathering activity that scans for vulnerabilities in your network. Scans
can come from external or internal source; and they target either hosts, or ports on a host. An
abundance of this activity can indicate an eminent attack, when a vulnerability is found.
The Reconnaissance Security Use Case monitors such activities and displays them on data monitors and
an active channel, which you access from the dashboard. The information collected by the use case
helps you investigate, then take actions on scanners and the scanned critical hosts.
The Reconnaissance use case contains the following resources:
l A dashboard (Reconnaissance Monitoring) is your starting point to monitor reconnaissance
activities. The dashboard provides access to the data monitors that show information on targeted
critical hosts, internal scanners, and top traffic activity.
l An active channel (Reconnaissance Activity) shows all reconnaissance events within a given
timeframe.
l A rule (Reconnaissance from Internal Source) looks for reconnaissance activity from internal sources.
Information is written to two active lists. You can further configure this rule to send notifications and
create cases.
HPE ESM: Reconnaissance 1.0 Page 4 of 33
Access the Reconnaissance use case from the Use Cases tab of the ArcSight Console Navigator panel.
The Monitor section of the use case lists the dashboard and the active channel used to monitor and
investigate reconnaissance activity. The Library section of the use case lists all supporting resources
that help collect information that goes on the dashboard and active channel.
The use case also provides a configuration wizard that guides you through required configuration.
This document describes how to install, configure, and use the Reconnaisance use case and is designed
for security professionals who have a basic understanding of ArcSight ESM and are familiar with the
ArcSight Console. For detailed information about using ArcSight ESM, see the ArcSight ESM help
system from the ArcSight Console Help menu. Find PDFs of all ArcSight documentation on Protect 724.
Note: With regard to reconnaissance activities, the source is the scanner address and the
destination is the scanned host.
Security Use Case Guide
Chapter 1: Overview
HPE ESM: Reconnaissance 1.0 Page 5 of 33
Chapter 2: Installation
To install the Reconnaissance use case, perform the following tasks in the prescribed sequence:
1. Download the Reconnaissance use case zip file from the ArcSight Marketplace into the ArcSight
Console system where you plan to install the use case. Extract the zip file.
2. Log into the ArcSight Console as administrator.
Note: During the package installation process, do not use the same administrator account to
start another Console or Command Center session simultaneously. This login is locked until the
package installation is completed.
3. Verify if you have a previous version of the use case package you want to install. If so, uninstall and
delete this previous version:
a. On the Packages tab of the Navigator panel, right-click the package and select Uninstall
Package. The package icon is gray when it is uninstalled.
b. Right-click the package and select Delete Package.
4. On the Packages tab, verify if Downloads Groups is already installed. If you see packages in /All
Packages/Downloads/Downloads Groups, then ignore this step.
If the Downloads Groups package is not present, import and install the Downloads_Groups_1.0.arb
package. See "Importing and Installing a Package" on the next page for details.
5. Import and install the Reconnaissance use case package. See "Importing and Installing a Package"
on the next page for details.
6. Assign user permissions to the Reconnaissance resources. See "Assigning User Permissions" on
pageĀ 8 for details.
HPE ESM: Reconnaissance 1.0 Page 6 of 33
Importing and Installing a Package
This procedure assumes you have downloaded the zip file and extracted the contents into the ArcSight
Console system. You must have administrator privileges to perform the tasks.
l If the ArcSight Console does not have the Downloads Groups package in /All
Packages/Downloads/Downloads Groups, import and install that package first. Then repeat the
steps to import and install the Reconnaissance use case package.
Note: The Downloads Groups package contains the groups used by the resources in the security
use case; you must import and install this package first.
l If the Downloads Groups package is already installed, follow the steps to import and install the
Reconnaissance use case package only.
To import and install a package:
1. Log into the ArcSight Console as administrator. In the Navigator panel, click the Packages tab.
2. Click Import.
3. In the Open dialog, browse and select the Reconnaissance_1.0.arb package file you want to
import, then click Open.
The Importing Packages dialog shows how the package import is being verified for any resource
conflicts.
4. In the Packages for Installation dialog, make sure that the check box is selected next to the name of
the package you want to install and click Next.
The Progress tab shows how the installation is progressing. When the installation is complete, the
Results tab displays the summary report.
5. In the Installing Packages dialog, click OK. In the Importing Packages dialog, click OK.
6. On the Packages tab of the Navigator panel, expand the package group in /All
Packages/Downloads/ to verify that the package group is populated and that installation is
successful.
Security Use Case Guide
Chapter 2: Installation
HPE ESM: Reconnaissance 1.0 Page 7 of 33
Assigning User Permissions
By default, users in the Administrators and Default User Groups/Analyzer
Administrators user groups can view and edit ESM resources. Users in the Default User Groups
(and any custom user group under this group) can only view Reconnaissance resources. Depending on
how you set up user access controls within your organization, you might need to adjust those controls
to make sure the resources are accessible to the authorized users.
Note: By default, the Default User Groups/Analyzer Administrators user group does
not have edit permissions for archived reports in the Downloads group.
The following procedure assumes that you have logged into the ArcSight Console as administrator, and
that you have set up the required user groups with the authorized users.
To assign user permissions:
1. In the Navigator panel, open the Resources tab.
2. For each of the resource types provided in the use case, navigate to Downloads/Hostile
Activity Detection.
3. Right-click the Reconnaissance group and select Edit Access Control to open the ACL editor in
the Inspect/Edit panel.
4. Select the user groups for which you want to grant permissions and click OK.
Security Use Case Guide
Chapter 2: Installation
HPE ESM: Reconnaissance 1.0 Page 8 of 33
Chapter 3: Configuration
Before configuring the use case, make sure that you have populated your ESM network model. A
network model keeps track of the network nodes participating in the event traffic. For information
about populating the network model, refer to the ArcSight Console Userā€™s Guide.
The Reconnaissance use case requires the following configurations for your environment:
l SmartConnectors: Install the appropriate ArcSight SmartConnectors to receive relevant events from
your antivirus server. Examples are SmartConnectors for McAfee ePolicy Orchestrator DB and for
Symantec AntiVirus Corporate Edition File.
o Refer to the applicable SmartConnector guide for installation instructions.
o Refer to the ArcSight Console User's Guide for instructions to register SmartConnectors in ESM.
l Asset categorization: Manually categorize all internal assets (assets inside the company network),
or the zones to which the assets belong, with the Protected asset category. This category is located
in /All Asset Categories/Site Asset Categories/Address Spaces/Protected).
Assets that are not categorized as internal to the network are considered to be external. Make sure
that you also categorize assets that have public addresses but are controlled by the organization
(such as Web servers) as Protected.
In addition, configure which protected assets belong to either /All Asset Categories/System
Asset Categories/Criticality/Very High or /All Asset Categories/System Asset
Categories/Criticality/High.
Refer to the topic, "Managing Asset Categories," in the ArcSight Console User's Guide.
Note: You must categorize assets internal to the network manually; the procedure is not part of the
use case configuration wizard.
To configure the Reconnaissance use case:
1. In the Navigator panel, click the Use Cases tab.
2. Go to the Reconnaissance use case located in /All Use Cases/Downloads/Hostile
Activity Detection.
3. Open the Reconnaissance use case: double-click the use case, or right-click the use case and select
Open Use Case.
The Reconnaissance use case lists all the resources used for monitoring reconnaissance activity.
HPE ESM: Reconnaissance 1.0 Page 9 of 33
4. Click the Configure button to open the configuration wizard.
5. Click Next to follow the configuration steps.
After you configure the Reconnaissance use case, you are ready to monitor reconnaissance activity. See
"Getting Started with the Reconnaissance Monitoring Dashboard" on pageĀ 11.
Security Use Case Guide
Chapter 3: Configuration
HPE ESM: Reconnaissance 1.0 Page 10 of 33
Chapter 4: Getting Started with the
Reconnaissance Monitoring Dashboard
The Reconnaissance use case provides a dashboard to help you detect reconnaissance activities. Use
this dashboard as a starting point for monitoring traffic scans into your network.
To open the dashboard, click the link for the dashboard in the Reconnaissance use case.
The dashboard opens in the Viewer panel of the ArcSight Console.
HPE ESM: Reconnaissance 1.0 Page 11 of 33
Following is an example of the dashboard:
The Reconnaissance Monitoring dashboard includes the following data monitors, from top left,
clockwise:
l Critical Hosts Scanned
Refer to "Using the Critical Hosts Scanned Data Monitor" on pageĀ 22 for details.
l Internal Scanner Activity
Refer to "Using the Internal Scanner Activity Data Monitor" on pageĀ 15 for details.
l Top Critical Hosts Scanned by External Sources
Refer to "Using the Top Critical Hosts Scanned by External Source Data Monitor" on pageĀ 25 for
details.
l Top Traffic from Internal Scanners
Refer to "Using the Top Traffic from Internal Scanners Data Monitor" on pageĀ 18 for details.
l Top Internal Scanned Hosts
Refer to "Using the Top Internal Scanned Hosts Data Monitor" on pageĀ 28 for details.
Security Use Case Guide
Chapter 4: Getting Started with the Reconnaissance Monitoring Dashboard
HPE ESM: Reconnaissance 1.0 Page 12 of 33
Chapter 5: Monitoring the Reconnaissance
Activity Active Channel
The active channel displays high-level information on all reconnaissance (attempts or successes) from all
sources to all destinations.
To open the active channel, click the link on the Reconnaissance use case:
Following is an example of the Reconnaissance Activity active channel:
HPE ESM: Reconnaissance 1.0 Page 13 of 33
To view the active channel:
l On the Reconnaissance use case's Active Channels section, click the Reconnaissance Activity link,
Or
l On the Navigator > Resources panel:
a. Go to /All Active Channels/Downloads/Hostile Activity
Detection/Reconnaisance.
b. Right-click Reconnaissance Activity and select Show Active Channel.
To use the active channel:
l Right-click an item (such as an IP address) and select Show Event Details to see detailed
information about the event. You can also create an inline filter to display events from a specific item.
See the ArcSight Console User's Guide's topic on using active channels for information about menu
options and inline filters.
l Right-click on an event and select Export. Then select one of the available export options. Refer to
the ArcSight Console User's Guide's topic, "Exporting Events to a File," for more information.
Note: The events displayed in an active channel do not refresh automatically at ten-minute
intervals. To refresh the view, click the Stop and Replay channel controls in the toolbar.
Depending on your environment, ESM load, and specific investigation needs, you can configure an
active channel to use continuous, automatic channel refresh: Right-click the link for the active
channel in the use case and select Edit Active Channel. From the Time Parameters drop-down on
the Attributes tab of the Inspect/Edit panel, select Continuously evaluate.
Note: In a high EPS environment, you might see performance issues if you scroll down to try and
view all the events in the active channel.
Security Use Case Guide
Chapter 5: Monitoring the Reconnaissance Activity Active Channel
HPE ESM: Reconnaissance 1.0 Page 14 of 33
Chapter 6: Monitoring Internal Scanners
This chapter provides information about reconnaissance scans coming from within your network. While
you expect internal network activity to be routine, you need to differentiate between legitimate access
and suspicious scans from sources that are not authorized to access certain hosts. The ArcSight
resources for monitoring internal scanners help you identify internal scanners for further investigation.
Suspicious scans from unauthorized internal sources might indicate that the internal scanner has been
compromised and may be used for real attacks.
The following topics are covered:
l "Using the Internal Scanner Activity Data Monitor" below
l "Using the Top Traffic from Internal Scanners Data Monitor" on pageĀ 18
Using the Internal Scanner Activity Data Monitor
The Internal Scanner Activity data monitor tracks scans from internal sources to the destination hosts,
all occurring within the network. These hosts reside within the protected address spaces.
The Internal Scanner Activity data monitor is updated every 60 seconds and shows each source that
sent a maximum of 1000 scans to protected hosts.
HPE ESM: Reconnaissance 1.0 Page 15 of 33
Following is a partial view of the data monitor:
To view the Internal Scanner Activity data monitor:
l On the Reconnaissance use case's Dashboards section, click the link to the dashboard,
Reconnaissance Monitoring.
Or
l On the Navigator > Resources panel:
a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaisance.
b. Right-click Reconnaissance Monitoring and select Show Dashboard.
The Internal Scanner Activity data monitor is displayed on the top right of the Reconnaissance
Monitoring dashboard.
To interpret the Internal Scanner Activity data monitor:
l The data monitor uses a hierarchical layout of nodes.
l Red nodes represent scanner (source) addresses.
Security Use Case Guide
Chapter 6: Monitoring Internal Scanners
HPE ESM: Reconnaissance 1.0 Page 16 of 33
l Turquoise nodes represent the event name as sent by the device (for example, a firewall might show
permit, accept, or drop).
l White nodes represent the hosts' (destinations) addresses.
l Blue nodes can sometimes appear between a red and white squares. A blue node indicates that a
chain of scans has occurred, with the blue node as the intermediate scanner.
Tip: Try these:
l Zoom in on a particular area especially if the data monitor is displaying many nodes.
l Click the circular layout button ( ) on the toolbar for a different arrangement of the nodes.
Further investigations on the Internal Scanner Activity data monitor:
The activity shown on this data monitor includes routine traffic as well as questionable ones.
l Right-click on a square node (either a source or destination) and choose Show Events.
The Console displays the Internal Scanner Activity active channel, with end time evaluated hourly.
Use this channel to determine information about the specific node.
l Right-click on a circle (an event name) and choose Show Events.
The circle represents the event name. If you chose to show events on a specific event name, you can
use the information on the Internal Scanner Activity active channel to determine source addresses of
internal scanners.
Refer to the following topics in the ArcSight Console User's Guide :
o The "Reference Guide" section for descriptions of the different categories displayed on the active
channel
o The "Investigating Views" topic for various ways to use the right-click Investigate option
l Focus on the source addresses (the internal scanners). Are those scanners authorized to access the
destination? For the unauthorized internal scanners, who are the users assigned to those internal
scanners?
To fine tune the Internal Scanner Activity data monitor:
ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself
has default parameters that determine the time buckets.
Caution: If making changes to any parameters, you must be familiar with factors that affect ESM
performance resulting from these changes. You must also know how to edit ESM resources, such as
modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for
details.
Security Use Case Guide
Chapter 6: Monitoring Internal Scanners
HPE ESM: Reconnaissance 1.0 Page 17 of 33
Data monitor l Availability Interval: Default is 60 seconds in which the data monitor is updated. You can increase or
reduce this number.
l Max Event Count: Default is 1000 scans. You can increase or decrease the number depending on
investigative needs.
To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This
opens the data monitor's Edit panel.
The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on
"Event Graph Data Monitor" for details.
Filter used by
the data
monitor
Change the filter conditions to suit your business requirements. The filter is located in /All
Filters/Downloads/Hostile Activity Detection/Reconnaissance/Internal
Scanner Hosts.
Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to
filter conditions will affect the expected results in all resources using the filter.
Refer to the User's Guide's topic on "Filtering Events" for details.
Using the Top Traffic from Internal Scanners Data
Monitor
This data monitor shows the internal sources that generated the most scans in the last 6 hours. The
data monitor is updated every 60 seconds.
Security Use Case Guide
Chapter 6: Monitoring Internal Scanners
HPE ESM: Reconnaissance 1.0 Page 18 of 33
Following is a closeup of the data monitor.
To view the Top Traffic from Internal Scanners data monitor:
l On the Reconnaissance use case's Dashboards section, click the link to the dashboard,
Reconnaissance Monitoring.
Or
l On the Navigator > Resources panel:
a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaissance.
b. Right-click Reconnaissance Monitoring and select Show Dashboard.
The Top Traffic from Internal Scanners data monitor is located on the bottom center of the dashboard.
Use this data monitor to get an overview of the most active internal scanners within your network.
To interpret the Top Traffic from Internal Scanners data monitor:
l Each vertical bar on the chart represents one internal scanner, with the leftmost bar representing the
scanner that generated the most traffic.
Security Use Case Guide
Chapter 6: Monitoring Internal Scanners
HPE ESM: Reconnaissance 1.0 Page 19 of 33
l By default, the data monitor displays the top 10 internal scanners. The legend shows the total events
per scanner with the highest number on top. The legend labeled "others" is a sum of events from the
remaining scanners not belonging to the top 10.
Further investigations on the Top Traffic from Internal Scanners data monitor:
Use this data monitor to determine the internal scanners suspected of actively checking hosts for
vulnerabilities. This could indicate that these scanners have been compromised and may be even be
used to launch real attacks.
l Double-click on a chart element on the graph to open a channel specific to that element. Or right-click
an element and choose Investigate. Then choose an option to suit your investigative needs.
Tip: Refer to the following topics in the ArcSight Console User's Guide :
o The "Reference Guide" section for descriptions of the different categories displayed on the
active channel
o The "Investigating Views" topic for various ways to use the right-click Investigate option
To fine tune the Top Traffic from Internal Scanners data monitor:
ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself
has default parameters that determine the time buckets.
Caution: If making changes to any parameters, you must be familiar with factors that affect ESM
performance resulting from these changes. You must also know how to edit ESM resources, such as
modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for
details.
Security Use Case Guide
Chapter 6: Monitoring Internal Scanners
HPE ESM: Reconnaissance 1.0 Page 20 of 33
Data monitor l # top entries: Default is 10 top internal scanners. You can increase or reduce this number.
l Bucket size in Seconds: Default is 600 seconds (10 minutes) per bucket. You can increase or decrease
the size depending on investigative needs.
l Number of Buckets: The default is 36 buckets, which means a time range of 360 minutes or 6 hours.
You can increase or decrease the number depending on investigative needs.
Note: If you want to change the time range of the data monitor, adjust the bucket size or number of
buckets, or both.
To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This
opens the data monitor's Edit panel.
The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on
"Top Value Counts Data Monitor" for details.
Filter used by
the data
monitor
Change the filter conditions to suit your business requirements. The filter is located in /All
Filters/Downloads/Hostile Activity Detection/Reconnaissance/Internal
Scanner Hosts.
Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to
filter conditions will affect the expected results in all resources using the filter.
Refer to the User's Guide's topic on "Filtering Events" for details.
Security Use Case Guide
Chapter 6: Monitoring Internal Scanners
HPE ESM: Reconnaissance 1.0 Page 21 of 33
Chapter 7: Monitoring Scanned Hosts
This chapter provides information about critical hosts in your network that are being scanned for
reconnaissance purposes.
The following topics are covered:
l "Using the Critical Hosts Scanned Data Monitor" below
l "Using the Top Critical Hosts Scanned by External Source Data Monitor" on pageĀ 25
l "Using the Top Internal Scanned Hosts Data Monitor" on pageĀ 28
Using the Critical Hosts Scanned Data Monitor
The Critical Hosts Scanned data monitor tracks, in real time, assets in your network that were scanned,
either by external or internal sources. Specifically, these assets have a System Asset Category setting of
either Very High or High criticality.
Tip: An asset in your network model can be assigned various category settings. The hosts (assets)
displayed on this data monitor would have one of these system asset category settings:
l /All Asset Categories/System Asset Categories/Criticality/Very High
or
l /All Asset Categories/System Asset Categories/Criticality/High
The above settings are found in an asset's Categories tab.
The data monitor is updated every 60 seconds and shows each critical host that was scanned a
maximum of 1000 times.
HPE ESM: Reconnaissance 1.0 Page 22 of 33
Following is a closeup of the data monitor:
To view the Critical Hosts Scanned data monitor:
l On the Reconnaissance use case's Dashboards section, click the link to the dashboard,
Reconnaissance Monitoring.
Or
l On the Navigator > Resources panel:
a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaissance.
b. Right-click Reconnaissance Monitoring and select Show Dashboard.
The Critical Hosts Scanned data monitor is displayed on the top left of the Reconnaissance
Monitoring dashboard .
To interpret the Critical Hosts Scanned data monitor:
Red squares represent external source addresses; turquoise circles represent the event name as sent by
the device (for example, a firewall might send Permit, accept, or drop events); and white squares
Security Use Case Guide
Chapter 7: Monitoring Scanned Hosts
HPE ESM: Reconnaissance 1.0 Page 23 of 33
represent the destination addresses of critical hosts in your network. On the top left of the example, you
can see multiple sources targeting a single critical host.
Further investigations on the Critical Hosts Scanned data monitor:
Use this data monitor to determine which critical assets and their zones are of interest to the scanners.
l Right-click on a square node (either a source or destination) and choose Show Events.
The Console displays the Critical Hosts Scanned active channel, with end time evaluated hourly. Use
this channel to determine information about the specific node. For example, if you chose to show
events on a white node (the critical host destination), the active channel displays all incoming events
on that host.
l Right-click on a circle (an event name) and choose Show Events.
The circle represents the event name. If you chose to show events on an accept event, you can use
the information on the Critical Hosts Scanned active channel to determine source addresses whose
scans were accepted by critical hosts. The channel displays information about the sources such as
their zones, countries, and so on.
Tip: Refer to the following topics in the ArcSight Console User's Guide :
o The "Reference Guide" section for descriptions of the different categories displayed on the
active channel
o The "Investigating Views" topic for various ways to use the right-click Investigate option
To fine tune the Critical Hosts Scanned data monitor:
ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself
has default parameters that determine the time buckets.
Caution: If making changes to any parameters, you must be familiar with factors that affect ESM
performance resulting from these changes. You must also know how to edit ESM resources, such as
modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for
details.
Security Use Case Guide
Chapter 7: Monitoring Scanned Hosts
HPE ESM: Reconnaissance 1.0 Page 24 of 33
Data monitor l Availability Interval: Default is 60 seconds in which the data monitor is updated. You can increase or
reduce this number.
l Max Event Count: Default is 1000 scans. You can increase or decrease the number depending on
investigative needs.
To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This
opens the data monitor's Edit panel.
The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on
"Event Graph Data Monitor" for details.
Filter used by
the data
monitor
Change the filter conditions to suit your business requirements. The filter is located in /All
Filters/Downloads/Hostile Activity Detection/Reconnaissance/Critical Assets
Scanned.
Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to
filter conditions will affect the expected results in all resources using the filter.
Refer to the User's Guide's topic on "Filtering Events" for details.
Using the Top Critical Hosts Scanned by External
Source Data Monitor
This data monitor tracks the top critical assets that were scanned by external sources. While it is
impossible to control external sources, with this data monitor, you have the ability to protect those
critical assets before a real attack comes.
The data monitor shows the top 10 critical hosts that were scanned a maximum of 1000 times.
Information is updated every 60 seconds.
Security Use Case Guide
Chapter 7: Monitoring Scanned Hosts
HPE ESM: Reconnaissance 1.0 Page 25 of 33
Following is a closeup of the data monitor:
To view the Top Critical Hosts Scanned by External Source data monitor:
l On the Reconnaissance use case's Dashboards section, click the link to the dashboard,
Reconnaissance Monitoring.
Or
l On the Navigator > Resources panel:
a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaissance.
b. Right-click Reconnaissance Monitoring and select Show Dashboard.
The Top Critical Hosts Scanned by External Sources data monitor is displayed on the bottom left of
the Reconnaissance Monitoring dashboard.
To interpret the Top Critical Hosts Scanned by External Source data monitor:
The vertical bars display the critical hosts with very high scan counts from outside sources. The host
with the highest count is on the left.
Security Use Case Guide
Chapter 7: Monitoring Scanned Hosts
HPE ESM: Reconnaissance 1.0 Page 26 of 33
Further investigations on the Top Critical Hosts Scanned by External Source data
monitor:
Use this data monitor to determine which critical assets are being scanned the most, by external sources.
l Double-click a chart element on the graph to open an active channel specific to that element. Or
right-click a chart element and choose Investigate, then choose an option to suit your investigative
needs.
Refer to the following topics in the ArcSight Console User's Guide :
o The "Reference Guide" section for descriptions of the different categories displayed on the active
channel
o The "Investigating Views" topic for various ways to use the right-click Investigate option
To fine tune the Top Critical Hosts Scanned by External Sources data monitor:
ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself
has default parameters that determine the time buckets.
Caution: If making changes to any parameters, you must be familiar with factors that affect ESM
performance resulting from these changes. You must also know how to edit ESM resources, such as
modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for
details.
Data
monitor
l # of top entries: Default is top 10 critical hosts. You can increase or reduce this number.
l Bucket size in Seconds: Default is 600 (10 minutes) per bucket. You can increase or decrease the size
depending on investigative needs.
l Number of Buckets: The default is 36 buckets, which means a time range of 360 minutes or 6 hours.
You can increase or decrease the number depending on investigative needs.
Note: If you want to change the time range of the data monitor, adjust the bucket size or number of
buckets, or both.
To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This
opens the data monitor's Edit panel.
The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on
"Top Value Counts Data Monitor" for details.
Filter used
by the data
monitor
Change the filter conditions to suit your business requirements. The filter is located in /All
Filters/Downloads/Hostile Activity Detection/Reconnaissance/Critical Assets
Scanned by External Sources.
Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to
filter conditions will affect the expected results in all resources using the filter.
Refer to the User's Guide's topic on "Filtering Events" for details.
Security Use Case Guide
Chapter 7: Monitoring Scanned Hosts
HPE ESM: Reconnaissance 1.0 Page 27 of 33
Using the Top Internal Scanned Hosts Data Monitor
This data monitor shows the internal scanned hosts sorted by traffic coming from external or internal
scanners within the last 6 hours. It provides an overview of the most recent reconnaissance activity
against the network.
The data monitor shows the top 10 internal hosts that were scanned a maximum of 1000 times.
Information is updated every 60 seconds.
Following is a closeup of the data monitor:
Security Use Case Guide
Chapter 7: Monitoring Scanned Hosts
HPE ESM: Reconnaissance 1.0 Page 28 of 33
To view the Top Internal Scanned Hosts data monitor:
l On the Reconnaissance use case's Dashboards section, click the link to the dashboard,
Reconnaissance Monitoring.
Or
l On the Navigator > Resources panel:
a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaissance.
b. Right-click Reconnaissance Monitoring and select Show Dashboard.
The data monitor is located on the bottom right of the dashboard. Use this data monitor to investigate
what scanners consider to be the top "most popular" hosts.
To interpret the Top Internal Scanned Hosts data monitor:
l Each vertical bar on the chart represents one internal scanned host, with the leftmost bar
representing the host that received the most traffic.
l By default, the data monitor displays the top 10 internal scanned hosts. The legend shows the total
events per host with the highest number on top. The legend labeled "others" is a sum of events from
the remaining scanned hosts not belonging to the top 10.
Further investigations on the Top Internal Scanned Hosts data monitor:
Use this data monitor to identify the applications installed in the internally scanned hosts. Are these
applications critical to your operations? What is the impact if such hosts are attacked?
l Double-click a chart element on the graph to open a channel about that element. Or right-click a chart
element and choose Investigate, then choose an option to suit your investigative needs.
Refer to the following topics in the ArcSight Console User's Guide :
o The "Reference Guide" section for descriptions of the different categories displayed on the active
channel
o The "Investigating Views" topic for various ways to use the right-click Investigate option
l Right-click on an event and select Export. Then select one of the available export options. Refer to
the ArcSight Console User's Guide's topic, "Exporting Events to a File," for more information.
To fine tune the Top Internal Scanned Hosts data monitor:
ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself
has default parameters that determine the time buckets.
Caution: If making changes to any parameters, you must be familiar with factors that affect ESM
performance resulting from these changes. You must also know how to edit ESM resources, such as
modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for
Security Use Case Guide
Chapter 7: Monitoring Scanned Hosts
HPE ESM: Reconnaissance 1.0 Page 29 of 33
details.
Data monitor l # top entries: Default is 10 top internal scanned hosts. You can increase or reduce this number.
l Bucket size in Seconds: Default is 600 seconds (10 minutes) per bucket. You can increase or decrease
the size depending on investigative needs.
l Number of Buckets: The default is 36 buckets, which means a time range of 360 minutes or 6 hours.
You can increase or decrease the number depending on investigative needs.
Note: If you want to change the time range of the data monitor, adjust the bucket size or number of
buckets, or both.
To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This
opens the data monitor's Edit panel.
The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on
"Top Value Counts Data Monitor" for details.
Filter used by
the data
monitor
Change the filter conditions to suit your business requirements. The filter is located in /All
Filters/Downloads/Hostile Activity Detection/Reconnaissance/Internal
Scanned Hosts.
Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to
filter conditions will affect the expected results in all resources using the filter.
Refer to the User's Guide's topic on "Filtering Events" for details.
Security Use Case Guide
Chapter 7: Monitoring Scanned Hosts
HPE ESM: Reconnaissance 1.0 Page 30 of 33
Chapter 8: Refining the Reconnaissance from
Internal Sources Rule
The Reconnaissance security use case includes multiple rules to set event fields with values relevant to
tracking Reconnaissance activities. You are not required to modify these rules.
You can, however, modify the rule called Reconnaissance from Internal Source in /All
Rules/Downloads/Hostile Activity Detection/Reconnaissance. By default, this rule is
designed to add information about the source (scanner) address, the source zone, and customer data to
the Internal Scanners and Scanners List active lists.
Additionally, the rule has the following default but disabled actions:
l Create a case in /All Cases/Downloads/Hostile Activity Detection/Reconnaissance.
with the following features:
o The case name is Reconnaissance from Internal Source <source ip address>
Detected
o Include the base events related to the case.
Note: If the case does not yet exist, the rule first creates the case with the dynamically-
configured name then adds the base events to it. When the rule is triggered in the future, new
base events are added to the case.
l Send notification about the scan to the default destination, /All Destinations/SOC
Operators/.
o If you want to enable this rule with the default destination, make sure to configure it by adding
users to the appropriate destination levels.
o If you want to enable this rule action and you are not using the default destination SOC
Operators, make sure you first define your own destination resource. Then specify your custom
destination to the rule action.
Refer to the "Managing Notification Destinations" in the ArcSight Console User's Guide.
To customize rule actions:
Tip: Refer to the ArcSight Console User's Guide's topic on "Rule Actions Reference" for details on
the rule actions described here.
1. Log into the ArcSight Console with administrator privileges.
2. Go to /All Rules/Downloads/Hostile Activity Detection/Reconnaisance, right-click
Reconnaissance from Internal Source, and choose Edit Rule.
HPE ESM: Reconnaissance 1.0 Page 31 of 33
3. Click the disabled rule action, Add To Existing Case.
a. On the Actions tab, right-click and choose Enable Action.
b. If you want to further modify the rule action, right-click again and choose Edit.
For example, change the URI if you have previously created a custom case group for
reconnaissance tracking purposes.
4. Click the disabled rule action, Send Notification.
a. Right-click and choose Enable Action.
b. If you want to modify the rule action further, right-click again and choose Edit.
For example, choose a different destination group and customize the notification message.
Security Use Case Guide
Chapter 8: Refining the Reconnaissance from Internal Sources Rule
HPE ESM: Reconnaissance 1.0 Page 32 of 33
Send Documentation Feedback
If you have comments about this document, you can contact the documentation team by email. If an
email client is configured on this system, click the link above and an email window opens with the
following information in the subject line:
Feedback on Security Use Case Guide (ESM: Reconnaissance 1.0)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail client, and send
your feedback to arc-doc@hpe.com.
We appreciate your feedback!
HPE ESM: Reconnaissance 1.0 Page 33 of 33

More Related Content

What's hot

Ī‘Ī“Ī©Ī“Ī—- Ī¤Īæ Ī“Ī·Ī¼ĪæĪŗĻĪ±Ļ„Ī¹ĪŗĻŒ Ļ€ĪæĪ»ĪÆĻ„ĪµĻ…Ī¼Ī± - Ī¤ĪŸ Ī‘Ī¤ĪŸĪœĪŸ ĪšĪ‘Ī™ Ī— Ī ĪŸĪ›Ī™Ī¤Ī•Ī™Ī‘.
Ī‘Ī“Ī©Ī“Ī—- Ī¤Īæ Ī“Ī·Ī¼ĪæĪŗĻĪ±Ļ„Ī¹ĪŗĻŒ Ļ€ĪæĪ»ĪÆĻ„ĪµĻ…Ī¼Ī± - Ī¤ĪŸ Ī‘Ī¤ĪŸĪœĪŸ ĪšĪ‘Ī™ Ī— Ī ĪŸĪ›Ī™Ī¤Ī•Ī™Ī‘.Ī‘Ī“Ī©Ī“Ī—- Ī¤Īæ Ī“Ī·Ī¼ĪæĪŗĻĪ±Ļ„Ī¹ĪŗĻŒ Ļ€ĪæĪ»ĪÆĻ„ĪµĻ…Ī¼Ī± - Ī¤ĪŸ Ī‘Ī¤ĪŸĪœĪŸ ĪšĪ‘Ī™ Ī— Ī ĪŸĪ›Ī™Ī¤Ī•Ī™Ī‘.
Ī‘Ī“Ī©Ī“Ī—- Ī¤Īæ Ī“Ī·Ī¼ĪæĪŗĻĪ±Ļ„Ī¹ĪŗĻŒ Ļ€ĪæĪ»ĪÆĻ„ĪµĻ…Ī¼Ī± - Ī¤ĪŸ Ī‘Ī¤ĪŸĪœĪŸ ĪšĪ‘Ī™ Ī— Ī ĪŸĪ›Ī™Ī¤Ī•Ī™Ī‘.2Īæ Ī”Ī·Ī¼ĪæĻ„Ī¹ĪŗĻŒ Ī£Ļ‡ĪæĪ»ĪµĪÆĪæ ĪžĪ¬Ī½ĪøĪ·Ļ‚
Ā 
ĻĪ·Ī¼Ī±Ļ„Ī±
ĻĪ·Ī¼Ī±Ļ„Ī±ĻĪ·Ī¼Ī±Ļ„Ī±
ĻĪ·Ī¼Ī±Ļ„Ī±alexadra71
Ā 
Īµ Ļ„Ī¬Ī¾Ī· ĪŗĪæĪ¹Ī½Ļ‰Ī½Ī¹ĪŗĪ® ĪŗĪ±Ī¹ Ļ€ĪæĪ»Ī¹Ļ„Ī¹ĪŗĪ® Ī±Ī³Ļ‰Ī³Ī® Ļ€Ī±ĻĪæĻ…ĻƒĪÆĪ±ĻƒĪ·_ĻŒĪ»Ī·Ļ‚_Ļ„Ī·Ļ‚_Ļ…Ī»Ī·Ļ‚
Īµ Ļ„Ī¬Ī¾Ī·   ĪŗĪæĪ¹Ī½Ļ‰Ī½Ī¹ĪŗĪ® ĪŗĪ±Ī¹ Ļ€ĪæĪ»Ī¹Ļ„Ī¹ĪŗĪ® Ī±Ī³Ļ‰Ī³Ī® Ļ€Ī±ĻĪæĻ…ĻƒĪÆĪ±ĻƒĪ·_ĻŒĪ»Ī·Ļ‚_Ļ„Ī·Ļ‚_Ļ…Ī»Ī·Ļ‚Īµ Ļ„Ī¬Ī¾Ī·   ĪŗĪæĪ¹Ī½Ļ‰Ī½Ī¹ĪŗĪ® ĪŗĪ±Ī¹ Ļ€ĪæĪ»Ī¹Ļ„Ī¹ĪŗĪ® Ī±Ī³Ļ‰Ī³Ī® Ļ€Ī±ĻĪæĻ…ĻƒĪÆĪ±ĻƒĪ·_ĻŒĪ»Ī·Ļ‚_Ļ„Ī·Ļ‚_Ļ…Ī»Ī·Ļ‚
Īµ Ļ„Ī¬Ī¾Ī· ĪŗĪæĪ¹Ī½Ļ‰Ī½Ī¹ĪŗĪ® ĪŗĪ±Ī¹ Ļ€ĪæĪ»Ī¹Ļ„Ī¹ĪŗĪ® Ī±Ī³Ļ‰Ī³Ī® Ļ€Ī±ĻĪæĻ…ĻƒĪÆĪ±ĻƒĪ·_ĻŒĪ»Ī·Ļ‚_Ļ„Ī·Ļ‚_Ļ…Ī»Ī·Ļ‚3dimneap
Ā 
ĪŸ Ī†Ī³Ī¹ĪæĻ‚ Ī”Ī·Ī¼Ī®Ļ„ĻĪ¹ĪæĻ‚ Īæ ĪœĻ…ĻĪæĪ²Ī»ĻĻ„Ī·Ļ‚, Īæ Ļ€ĻĪæĻƒĻ„Ī¬Ļ„Ī·Ļ‚ Ļ„Ī·Ļ‚ Ī˜ĪµĻƒĻƒĪ±Ī»ĪæĪ½ĪÆĪŗĪ·Ļ‚. Ī£Ļ„Ī±Ļ…ĻĻŒĪ»ĪµĪ¾Īæ & Ī¶Ļ‰...
ĪŸ Ī†Ī³Ī¹ĪæĻ‚ Ī”Ī·Ī¼Ī®Ļ„ĻĪ¹ĪæĻ‚ Īæ ĪœĻ…ĻĪæĪ²Ī»ĻĻ„Ī·Ļ‚, Īæ Ļ€ĻĪæĻƒĻ„Ī¬Ļ„Ī·Ļ‚ Ļ„Ī·Ļ‚ Ī˜ĪµĻƒĻƒĪ±Ī»ĪæĪ½ĪÆĪŗĪ·Ļ‚. Ī£Ļ„Ī±Ļ…ĻĻŒĪ»ĪµĪ¾Īæ & Ī¶Ļ‰...ĪŸ Ī†Ī³Ī¹ĪæĻ‚ Ī”Ī·Ī¼Ī®Ļ„ĻĪ¹ĪæĻ‚ Īæ ĪœĻ…ĻĪæĪ²Ī»ĻĻ„Ī·Ļ‚, Īæ Ļ€ĻĪæĻƒĻ„Ī¬Ļ„Ī·Ļ‚ Ļ„Ī·Ļ‚ Ī˜ĪµĻƒĻƒĪ±Ī»ĪæĪ½ĪÆĪŗĪ·Ļ‚. Ī£Ļ„Ī±Ļ…ĻĻŒĪ»ĪµĪ¾Īæ & Ī¶Ļ‰...
ĪŸ Ī†Ī³Ī¹ĪæĻ‚ Ī”Ī·Ī¼Ī®Ļ„ĻĪ¹ĪæĻ‚ Īæ ĪœĻ…ĻĪæĪ²Ī»ĻĻ„Ī·Ļ‚, Īæ Ļ€ĻĪæĻƒĻ„Ī¬Ļ„Ī·Ļ‚ Ļ„Ī·Ļ‚ Ī˜ĪµĻƒĻƒĪ±Ī»ĪæĪ½ĪÆĪŗĪ·Ļ‚. Ī£Ļ„Ī±Ļ…ĻĻŒĪ»ĪµĪ¾Īæ & Ī¶Ļ‰...Ī Ī±Ļ€Ī±Ī“Ī·Ī¼Ī·Ļ„ĻĪ±ĪŗĪæĻ€ĪæĻĪ»ĪæĻ… Ī¤Ī¶Ī­Ī½Ī·
Ā 
Ī ĻĪ­Ļ€ĪµĪ¹ Ī½Ī± Ļ†Ī±Ī½ĻŽ Ī³ĪµĪ½Ī½Ī±ĪÆĪæĻ‚
Ī ĻĪ­Ļ€ĪµĪ¹ Ī½Ī± Ļ†Ī±Ī½ĻŽ Ī³ĪµĪ½Ī½Ī±ĪÆĪæĻ‚Ī ĻĪ­Ļ€ĪµĪ¹ Ī½Ī± Ļ†Ī±Ī½ĻŽ Ī³ĪµĪ½Ī½Ī±ĪÆĪæĻ‚
Ī ĻĪ­Ļ€ĪµĪ¹ Ī½Ī± Ļ†Ī±Ī½ĻŽ Ī³ĪµĪ½Ī½Ī±ĪÆĪæĻ‚Dimitra Mylonaki
Ā 
ĪµĪ½ĻŒĻ„Ī·Ļ„Ī± 1Ī· (Īæ Ļ†ĪÆĪ»ĪæĻ‚ Ī¼Ī±Ļ‚ Ļ„Īæ Ļ€ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½)
ĪµĪ½ĻŒĻ„Ī·Ļ„Ī± 1Ī· (Īæ Ļ†ĪÆĪ»ĪæĻ‚ Ī¼Ī±Ļ‚ Ļ„Īæ Ļ€ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½)ĪµĪ½ĻŒĻ„Ī·Ļ„Ī± 1Ī· (Īæ Ļ†ĪÆĪ»ĪæĻ‚ Ī¼Ī±Ļ‚ Ļ„Īæ Ļ€ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½)
ĪµĪ½ĻŒĻ„Ī·Ļ„Ī± 1Ī· (Īæ Ļ†ĪÆĪ»ĪæĻ‚ Ī¼Ī±Ļ‚ Ļ„Īæ Ļ€ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½)Giorgos Baroutas
Ā 
Ī— ĪµĪ¾Ī­Ī³ĪµĻĻƒĪ· ĻƒĻ„Ī· ĪœĪæĪ»Ī“ĪæĪ²Ī»Ī±Ļ‡ĪÆĪ±
Ī— ĪµĪ¾Ī­Ī³ĪµĻĻƒĪ· ĻƒĻ„Ī· ĪœĪæĪ»Ī“ĪæĪ²Ī»Ī±Ļ‡ĪÆĪ±Ī— ĪµĪ¾Ī­Ī³ĪµĻĻƒĪ· ĻƒĻ„Ī· ĪœĪæĪ»Ī“ĪæĪ²Ī»Ī±Ļ‡ĪÆĪ±
Ī— ĪµĪ¾Ī­Ī³ĪµĻĻƒĪ· ĻƒĻ„Ī· ĪœĪæĪ»Ī“ĪæĪ²Ī»Ī±Ļ‡ĪÆĪ±Christina Politaki
Ā 
Den ksexno ke agonizomai taksis a b
Den ksexno ke agonizomai  taksis a bDen ksexno ke agonizomai  taksis a b
Den ksexno ke agonizomai taksis a bEirini Papazaxariou
Ā 
Ī“Ī»ĻŽĻƒĻƒĪ± Ī”Ī„ . 2. 5. Ī„Ī„Ī¤Īæ Ī½ĪµĻĻŒ Ļ„Ī±Ī¾Ī¹Ī“ĪµĻĪµĪ¹Ī„Ī„
Ī“Ī»ĻŽĻƒĻƒĪ± Ī”Ī„ . 2. 5. Ī„Ī„Ī¤Īæ Ī½ĪµĻĻŒ Ļ„Ī±Ī¾Ī¹Ī“ĪµĻĪµĪ¹Ī„Ī„Ī“Ī»ĻŽĻƒĻƒĪ± Ī”Ī„ . 2. 5. Ī„Ī„Ī¤Īæ Ī½ĪµĻĻŒ Ļ„Ī±Ī¾Ī¹Ī“ĪµĻĪµĪ¹Ī„Ī„
Ī“Ī»ĻŽĻƒĻƒĪ± Ī”Ī„ . 2. 5. Ī„Ī„Ī¤Īæ Ī½ĪµĻĻŒ Ļ„Ī±Ī¾Ī¹Ī“ĪµĻĪµĪ¹Ī„Ī„Ī§ĻĪ®ĻƒĻ„ĪæĻ‚ Ī§Ī±ĻĪ¼Ļ€Ī®Ļ‚
Ā 
Ļ€Ī±ĻĪ±Ī“ĪæĻƒĪ¹Ī±ĪŗĪ¬ Ļ€Ī±Ī¹Ļ‡Ī½ĪÆĪ“Ī¹Ī± Ļ„Ī·Ļ‚ ĪŗĻĻ€ĻĪæĻ…
Ļ€Ī±ĻĪ±Ī“ĪæĻƒĪ¹Ī±ĪŗĪ¬ Ļ€Ī±Ī¹Ļ‡Ī½ĪÆĪ“Ī¹Ī± Ļ„Ī·Ļ‚ ĪŗĻĻ€ĻĪæĻ…Ļ€Ī±ĻĪ±Ī“ĪæĻƒĪ¹Ī±ĪŗĪ¬ Ļ€Ī±Ī¹Ļ‡Ī½ĪÆĪ“Ī¹Ī± Ļ„Ī·Ļ‚ ĪŗĻĻ€ĻĪæĻ…
Ļ€Ī±ĻĪ±Ī“ĪæĻƒĪ¹Ī±ĪŗĪ¬ Ļ€Ī±Ī¹Ļ‡Ī½ĪÆĪ“Ī¹Ī± Ļ„Ī·Ļ‚ ĪŗĻĻ€ĻĪæĻ…ĪœĪ±ĻĪ¹Ī¬Ī½Ī½Ī± Ī™Ļ‰Ī¬Ī½Ī½ĪæĻ…
Ā 
Ļ€Ī±ĻĪæĻ…ĻƒĪ¹Ī±ĻƒĪ· 28Ī· ĪæĪŗĻ„Ļ‰Ī²ĻĪÆĪæĻ… 1940
Ļ€Ī±ĻĪæĻ…ĻƒĪ¹Ī±ĻƒĪ· 28Ī· ĪæĪŗĻ„Ļ‰Ī²ĻĪÆĪæĻ… 1940Ļ€Ī±ĻĪæĻ…ĻƒĪ¹Ī±ĻƒĪ· 28Ī· ĪæĪŗĻ„Ļ‰Ī²ĻĪÆĪæĻ… 1940
Ļ€Ī±ĻĪæĻ…ĻƒĪ¹Ī±ĻƒĪ· 28Ī· ĪæĪŗĻ„Ļ‰Ī²ĻĪÆĪæĻ… 1940dimalida
Ā 
Ī ĻĪæĻƒĪøĪ­Ļ„Ļ‰ ĪŗĪ±Ī¹ Ī±Ļ†Ī±Ī¹ĻĻŽ Ī“ĪµĪŗĪ±Ī“Ī¹ĪŗĪæĻĻ‚ Ī±ĻĪ¹ĪøĪ¼ĪæĻĻ‚, ĪœĪ±ĪøĪ·Ī¼Ī±Ļ„Ī¹ĪŗĪ¬ Ī” Ī¤Ī¬Ī¾Ī· - Ī•Ī½ĻŒĻ„Ī·Ļ„Ī±:19, 20
Ī ĻĪæĻƒĪøĪ­Ļ„Ļ‰ ĪŗĪ±Ī¹ Ī±Ļ†Ī±Ī¹ĻĻŽ Ī“ĪµĪŗĪ±Ī“Ī¹ĪŗĪæĻĻ‚ Ī±ĻĪ¹ĪøĪ¼ĪæĻĻ‚, ĪœĪ±ĪøĪ·Ī¼Ī±Ļ„Ī¹ĪŗĪ¬ Ī”  Ī¤Ī¬Ī¾Ī· - Ī•Ī½ĻŒĻ„Ī·Ļ„Ī±:19, 20Ī ĻĪæĻƒĪøĪ­Ļ„Ļ‰ ĪŗĪ±Ī¹ Ī±Ļ†Ī±Ī¹ĻĻŽ Ī“ĪµĪŗĪ±Ī“Ī¹ĪŗĪæĻĻ‚ Ī±ĻĪ¹ĪøĪ¼ĪæĻĻ‚, ĪœĪ±ĪøĪ·Ī¼Ī±Ļ„Ī¹ĪŗĪ¬ Ī”  Ī¤Ī¬Ī¾Ī· - Ī•Ī½ĻŒĻ„Ī·Ļ„Ī±:19, 20
Ī ĻĪæĻƒĪøĪ­Ļ„Ļ‰ ĪŗĪ±Ī¹ Ī±Ļ†Ī±Ī¹ĻĻŽ Ī“ĪµĪŗĪ±Ī“Ī¹ĪŗĪæĻĻ‚ Ī±ĻĪ¹ĪøĪ¼ĪæĻĻ‚, ĪœĪ±ĪøĪ·Ī¼Ī±Ļ„Ī¹ĪŗĪ¬ Ī” Ī¤Ī¬Ī¾Ī· - Ī•Ī½ĻŒĻ„Ī·Ļ„Ī±:19, 20Ī—Ī»Ī¹Ī¬Ī“Ī·Ļ‚ Ī—Ī»ĪÆĪ±Ļ‚
Ā 
Ī Ļ…ĻĻĪÆĻ‡Ī¹ĪæĻ‚ Ļ‡ĪæĻĻŒĻ‚
Ī Ļ…ĻĻĪÆĻ‡Ī¹ĪæĻ‚ Ļ‡ĪæĻĻŒĻ‚Ī Ļ…ĻĻĪÆĻ‡Ī¹ĪæĻ‚ Ļ‡ĪæĻĻŒĻ‚
Ī Ļ…ĻĻĪÆĻ‡Ī¹ĪæĻ‚ Ļ‡ĪæĻĻŒĻ‚Maniatis Kostas
Ā 
Ļ€ĻĪæĻ€Ī±ĻĪæĪ¾Ļ…Ļ„ĪæĪ½Ī± Ī±ĻĻƒĪµĪ½Ī¹ĪŗĪ± ĻƒĪµ ĪæĻ‚
Ļ€ĻĪæĻ€Ī±ĻĪæĪ¾Ļ…Ļ„ĪæĪ½Ī±  Ī±ĻĻƒĪµĪ½Ī¹ĪŗĪ± ĻƒĪµ  ĪæĻ‚Ļ€ĻĪæĻ€Ī±ĻĪæĪ¾Ļ…Ļ„ĪæĪ½Ī±  Ī±ĻĻƒĪµĪ½Ī¹ĪŗĪ± ĻƒĪµ  ĪæĻ‚
Ļ€ĻĪæĻ€Ī±ĻĪæĪ¾Ļ…Ļ„ĪæĪ½Ī± Ī±ĻĻƒĪµĪ½Ī¹ĪŗĪ± ĻƒĪµ ĪæĻ‚alexadra71
Ā 

What's hot (17)

Ī‘Ī“Ī©Ī“Ī—- Ī¤Īæ Ī“Ī·Ī¼ĪæĪŗĻĪ±Ļ„Ī¹ĪŗĻŒ Ļ€ĪæĪ»ĪÆĻ„ĪµĻ…Ī¼Ī± - Ī¤ĪŸ Ī‘Ī¤ĪŸĪœĪŸ ĪšĪ‘Ī™ Ī— Ī ĪŸĪ›Ī™Ī¤Ī•Ī™Ī‘.
Ī‘Ī“Ī©Ī“Ī—- Ī¤Īæ Ī“Ī·Ī¼ĪæĪŗĻĪ±Ļ„Ī¹ĪŗĻŒ Ļ€ĪæĪ»ĪÆĻ„ĪµĻ…Ī¼Ī± - Ī¤ĪŸ Ī‘Ī¤ĪŸĪœĪŸ ĪšĪ‘Ī™ Ī— Ī ĪŸĪ›Ī™Ī¤Ī•Ī™Ī‘.Ī‘Ī“Ī©Ī“Ī—- Ī¤Īæ Ī“Ī·Ī¼ĪæĪŗĻĪ±Ļ„Ī¹ĪŗĻŒ Ļ€ĪæĪ»ĪÆĻ„ĪµĻ…Ī¼Ī± - Ī¤ĪŸ Ī‘Ī¤ĪŸĪœĪŸ ĪšĪ‘Ī™ Ī— Ī ĪŸĪ›Ī™Ī¤Ī•Ī™Ī‘.
Ī‘Ī“Ī©Ī“Ī—- Ī¤Īæ Ī“Ī·Ī¼ĪæĪŗĻĪ±Ļ„Ī¹ĪŗĻŒ Ļ€ĪæĪ»ĪÆĻ„ĪµĻ…Ī¼Ī± - Ī¤ĪŸ Ī‘Ī¤ĪŸĪœĪŸ ĪšĪ‘Ī™ Ī— Ī ĪŸĪ›Ī™Ī¤Ī•Ī™Ī‘.
Ā 
ĻĪ·Ī¼Ī±Ļ„Ī±
ĻĪ·Ī¼Ī±Ļ„Ī±ĻĪ·Ī¼Ī±Ļ„Ī±
ĻĪ·Ī¼Ī±Ļ„Ī±
Ā 
Īµ Ļ„Ī¬Ī¾Ī· ĪŗĪæĪ¹Ī½Ļ‰Ī½Ī¹ĪŗĪ® ĪŗĪ±Ī¹ Ļ€ĪæĪ»Ī¹Ļ„Ī¹ĪŗĪ® Ī±Ī³Ļ‰Ī³Ī® Ļ€Ī±ĻĪæĻ…ĻƒĪÆĪ±ĻƒĪ·_ĻŒĪ»Ī·Ļ‚_Ļ„Ī·Ļ‚_Ļ…Ī»Ī·Ļ‚
Īµ Ļ„Ī¬Ī¾Ī·   ĪŗĪæĪ¹Ī½Ļ‰Ī½Ī¹ĪŗĪ® ĪŗĪ±Ī¹ Ļ€ĪæĪ»Ī¹Ļ„Ī¹ĪŗĪ® Ī±Ī³Ļ‰Ī³Ī® Ļ€Ī±ĻĪæĻ…ĻƒĪÆĪ±ĻƒĪ·_ĻŒĪ»Ī·Ļ‚_Ļ„Ī·Ļ‚_Ļ…Ī»Ī·Ļ‚Īµ Ļ„Ī¬Ī¾Ī·   ĪŗĪæĪ¹Ī½Ļ‰Ī½Ī¹ĪŗĪ® ĪŗĪ±Ī¹ Ļ€ĪæĪ»Ī¹Ļ„Ī¹ĪŗĪ® Ī±Ī³Ļ‰Ī³Ī® Ļ€Ī±ĻĪæĻ…ĻƒĪÆĪ±ĻƒĪ·_ĻŒĪ»Ī·Ļ‚_Ļ„Ī·Ļ‚_Ļ…Ī»Ī·Ļ‚
Īµ Ļ„Ī¬Ī¾Ī· ĪŗĪæĪ¹Ī½Ļ‰Ī½Ī¹ĪŗĪ® ĪŗĪ±Ī¹ Ļ€ĪæĪ»Ī¹Ļ„Ī¹ĪŗĪ® Ī±Ī³Ļ‰Ī³Ī® Ļ€Ī±ĻĪæĻ…ĻƒĪÆĪ±ĻƒĪ·_ĻŒĪ»Ī·Ļ‚_Ļ„Ī·Ļ‚_Ļ…Ī»Ī·Ļ‚
Ā 
ĪŗĪµĻ†Ī±Ī»Ī±Ī¹Īæ 18
ĪŗĪµĻ†Ī±Ī»Ī±Ī¹Īæ 18ĪŗĪµĻ†Ī±Ī»Ī±Ī¹Īæ 18
ĪŗĪµĻ†Ī±Ī»Ī±Ī¹Īæ 18
Ā 
ĪŸ Ī†Ī³Ī¹ĪæĻ‚ Ī”Ī·Ī¼Ī®Ļ„ĻĪ¹ĪæĻ‚ Īæ ĪœĻ…ĻĪæĪ²Ī»ĻĻ„Ī·Ļ‚, Īæ Ļ€ĻĪæĻƒĻ„Ī¬Ļ„Ī·Ļ‚ Ļ„Ī·Ļ‚ Ī˜ĪµĻƒĻƒĪ±Ī»ĪæĪ½ĪÆĪŗĪ·Ļ‚. Ī£Ļ„Ī±Ļ…ĻĻŒĪ»ĪµĪ¾Īæ & Ī¶Ļ‰...
ĪŸ Ī†Ī³Ī¹ĪæĻ‚ Ī”Ī·Ī¼Ī®Ļ„ĻĪ¹ĪæĻ‚ Īæ ĪœĻ…ĻĪæĪ²Ī»ĻĻ„Ī·Ļ‚, Īæ Ļ€ĻĪæĻƒĻ„Ī¬Ļ„Ī·Ļ‚ Ļ„Ī·Ļ‚ Ī˜ĪµĻƒĻƒĪ±Ī»ĪæĪ½ĪÆĪŗĪ·Ļ‚. Ī£Ļ„Ī±Ļ…ĻĻŒĪ»ĪµĪ¾Īæ & Ī¶Ļ‰...ĪŸ Ī†Ī³Ī¹ĪæĻ‚ Ī”Ī·Ī¼Ī®Ļ„ĻĪ¹ĪæĻ‚ Īæ ĪœĻ…ĻĪæĪ²Ī»ĻĻ„Ī·Ļ‚, Īæ Ļ€ĻĪæĻƒĻ„Ī¬Ļ„Ī·Ļ‚ Ļ„Ī·Ļ‚ Ī˜ĪµĻƒĻƒĪ±Ī»ĪæĪ½ĪÆĪŗĪ·Ļ‚. Ī£Ļ„Ī±Ļ…ĻĻŒĪ»ĪµĪ¾Īæ & Ī¶Ļ‰...
ĪŸ Ī†Ī³Ī¹ĪæĻ‚ Ī”Ī·Ī¼Ī®Ļ„ĻĪ¹ĪæĻ‚ Īæ ĪœĻ…ĻĪæĪ²Ī»ĻĻ„Ī·Ļ‚, Īæ Ļ€ĻĪæĻƒĻ„Ī¬Ļ„Ī·Ļ‚ Ļ„Ī·Ļ‚ Ī˜ĪµĻƒĻƒĪ±Ī»ĪæĪ½ĪÆĪŗĪ·Ļ‚. Ī£Ļ„Ī±Ļ…ĻĻŒĪ»ĪµĪ¾Īæ & Ī¶Ļ‰...
Ā 
Ī ĻĪ­Ļ€ĪµĪ¹ Ī½Ī± Ļ†Ī±Ī½ĻŽ Ī³ĪµĪ½Ī½Ī±ĪÆĪæĻ‚
Ī ĻĪ­Ļ€ĪµĪ¹ Ī½Ī± Ļ†Ī±Ī½ĻŽ Ī³ĪµĪ½Ī½Ī±ĪÆĪæĻ‚Ī ĻĪ­Ļ€ĪµĪ¹ Ī½Ī± Ļ†Ī±Ī½ĻŽ Ī³ĪµĪ½Ī½Ī±ĪÆĪæĻ‚
Ī ĻĪ­Ļ€ĪµĪ¹ Ī½Ī± Ļ†Ī±Ī½ĻŽ Ī³ĪµĪ½Ī½Ī±ĪÆĪæĻ‚
Ā 
ĪµĪ½ĻŒĻ„Ī·Ļ„Ī± 1Ī· (Īæ Ļ†ĪÆĪ»ĪæĻ‚ Ī¼Ī±Ļ‚ Ļ„Īæ Ļ€ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½)
ĪµĪ½ĻŒĻ„Ī·Ļ„Ī± 1Ī· (Īæ Ļ†ĪÆĪ»ĪæĻ‚ Ī¼Ī±Ļ‚ Ļ„Īæ Ļ€ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½)ĪµĪ½ĻŒĻ„Ī·Ļ„Ī± 1Ī· (Īæ Ļ†ĪÆĪ»ĪæĻ‚ Ī¼Ī±Ļ‚ Ļ„Īæ Ļ€ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½)
ĪµĪ½ĻŒĻ„Ī·Ļ„Ī± 1Ī· (Īæ Ļ†ĪÆĪ»ĪæĻ‚ Ī¼Ī±Ļ‚ Ļ„Īæ Ļ€ĪµĻĪ¹Ī²Ī¬Ī»Ī»ĪæĪ½)
Ā 
Ī— ĪµĪ¾Ī­Ī³ĪµĻĻƒĪ· ĻƒĻ„Ī· ĪœĪæĪ»Ī“ĪæĪ²Ī»Ī±Ļ‡ĪÆĪ±
Ī— ĪµĪ¾Ī­Ī³ĪµĻĻƒĪ· ĻƒĻ„Ī· ĪœĪæĪ»Ī“ĪæĪ²Ī»Ī±Ļ‡ĪÆĪ±Ī— ĪµĪ¾Ī­Ī³ĪµĻĻƒĪ· ĻƒĻ„Ī· ĪœĪæĪ»Ī“ĪæĪ²Ī»Ī±Ļ‡ĪÆĪ±
Ī— ĪµĪ¾Ī­Ī³ĪµĻĻƒĪ· ĻƒĻ„Ī· ĪœĪæĪ»Ī“ĪæĪ²Ī»Ī±Ļ‡ĪÆĪ±
Ā 
Den ksexno ke agonizomai taksis a b
Den ksexno ke agonizomai  taksis a bDen ksexno ke agonizomai  taksis a b
Den ksexno ke agonizomai taksis a b
Ā 
ĪŸ Ī Ī±Ī³ĪæĻ€ĻŽĪ»Ī·Ļ‚
ĪŸ Ī Ī±Ī³ĪæĻ€ĻŽĪ»Ī·Ļ‚ĪŸ Ī Ī±Ī³ĪæĻ€ĻŽĪ»Ī·Ļ‚
ĪŸ Ī Ī±Ī³ĪæĻ€ĻŽĪ»Ī·Ļ‚
Ā 
Ī“Ī»ĻŽĻƒĻƒĪ± Ī”Ī„ . 2. 5. Ī„Ī„Ī¤Īæ Ī½ĪµĻĻŒ Ļ„Ī±Ī¾Ī¹Ī“ĪµĻĪµĪ¹Ī„Ī„
Ī“Ī»ĻŽĻƒĻƒĪ± Ī”Ī„ . 2. 5. Ī„Ī„Ī¤Īæ Ī½ĪµĻĻŒ Ļ„Ī±Ī¾Ī¹Ī“ĪµĻĪµĪ¹Ī„Ī„Ī“Ī»ĻŽĻƒĻƒĪ± Ī”Ī„ . 2. 5. Ī„Ī„Ī¤Īæ Ī½ĪµĻĻŒ Ļ„Ī±Ī¾Ī¹Ī“ĪµĻĪµĪ¹Ī„Ī„
Ī“Ī»ĻŽĻƒĻƒĪ± Ī”Ī„ . 2. 5. Ī„Ī„Ī¤Īæ Ī½ĪµĻĻŒ Ļ„Ī±Ī¾Ī¹Ī“ĪµĻĪµĪ¹Ī„Ī„
Ā 
Ļ€Ī±ĻĪ±Ī“ĪæĻƒĪ¹Ī±ĪŗĪ¬ Ļ€Ī±Ī¹Ļ‡Ī½ĪÆĪ“Ī¹Ī± Ļ„Ī·Ļ‚ ĪŗĻĻ€ĻĪæĻ…
Ļ€Ī±ĻĪ±Ī“ĪæĻƒĪ¹Ī±ĪŗĪ¬ Ļ€Ī±Ī¹Ļ‡Ī½ĪÆĪ“Ī¹Ī± Ļ„Ī·Ļ‚ ĪŗĻĻ€ĻĪæĻ…Ļ€Ī±ĻĪ±Ī“ĪæĻƒĪ¹Ī±ĪŗĪ¬ Ļ€Ī±Ī¹Ļ‡Ī½ĪÆĪ“Ī¹Ī± Ļ„Ī·Ļ‚ ĪŗĻĻ€ĻĪæĻ…
Ļ€Ī±ĻĪ±Ī“ĪæĻƒĪ¹Ī±ĪŗĪ¬ Ļ€Ī±Ī¹Ļ‡Ī½ĪÆĪ“Ī¹Ī± Ļ„Ī·Ļ‚ ĪŗĻĻ€ĻĪæĻ…
Ā 
Ļ€Ī±ĻĪæĻ…ĻƒĪ¹Ī±ĻƒĪ· 28Ī· ĪæĪŗĻ„Ļ‰Ī²ĻĪÆĪæĻ… 1940
Ļ€Ī±ĻĪæĻ…ĻƒĪ¹Ī±ĻƒĪ· 28Ī· ĪæĪŗĻ„Ļ‰Ī²ĻĪÆĪæĻ… 1940Ļ€Ī±ĻĪæĻ…ĻƒĪ¹Ī±ĻƒĪ· 28Ī· ĪæĪŗĻ„Ļ‰Ī²ĻĪÆĪæĻ… 1940
Ļ€Ī±ĻĪæĻ…ĻƒĪ¹Ī±ĻƒĪ· 28Ī· ĪæĪŗĻ„Ļ‰Ī²ĻĪÆĪæĻ… 1940
Ā 
Ī ĻĪæĻƒĪøĪ­Ļ„Ļ‰ ĪŗĪ±Ī¹ Ī±Ļ†Ī±Ī¹ĻĻŽ Ī“ĪµĪŗĪ±Ī“Ī¹ĪŗĪæĻĻ‚ Ī±ĻĪ¹ĪøĪ¼ĪæĻĻ‚, ĪœĪ±ĪøĪ·Ī¼Ī±Ļ„Ī¹ĪŗĪ¬ Ī” Ī¤Ī¬Ī¾Ī· - Ī•Ī½ĻŒĻ„Ī·Ļ„Ī±:19, 20
Ī ĻĪæĻƒĪøĪ­Ļ„Ļ‰ ĪŗĪ±Ī¹ Ī±Ļ†Ī±Ī¹ĻĻŽ Ī“ĪµĪŗĪ±Ī“Ī¹ĪŗĪæĻĻ‚ Ī±ĻĪ¹ĪøĪ¼ĪæĻĻ‚, ĪœĪ±ĪøĪ·Ī¼Ī±Ļ„Ī¹ĪŗĪ¬ Ī”  Ī¤Ī¬Ī¾Ī· - Ī•Ī½ĻŒĻ„Ī·Ļ„Ī±:19, 20Ī ĻĪæĻƒĪøĪ­Ļ„Ļ‰ ĪŗĪ±Ī¹ Ī±Ļ†Ī±Ī¹ĻĻŽ Ī“ĪµĪŗĪ±Ī“Ī¹ĪŗĪæĻĻ‚ Ī±ĻĪ¹ĪøĪ¼ĪæĻĻ‚, ĪœĪ±ĪøĪ·Ī¼Ī±Ļ„Ī¹ĪŗĪ¬ Ī”  Ī¤Ī¬Ī¾Ī· - Ī•Ī½ĻŒĻ„Ī·Ļ„Ī±:19, 20
Ī ĻĪæĻƒĪøĪ­Ļ„Ļ‰ ĪŗĪ±Ī¹ Ī±Ļ†Ī±Ī¹ĻĻŽ Ī“ĪµĪŗĪ±Ī“Ī¹ĪŗĪæĻĻ‚ Ī±ĻĪ¹ĪøĪ¼ĪæĻĻ‚, ĪœĪ±ĪøĪ·Ī¼Ī±Ļ„Ī¹ĪŗĪ¬ Ī” Ī¤Ī¬Ī¾Ī· - Ī•Ī½ĻŒĻ„Ī·Ļ„Ī±:19, 20
Ā 
ĪŸ Ī±Ī¼Ī±Ī¾Ī¬Ļ‚
ĪŸ Ī±Ī¼Ī±Ī¾Ī¬Ļ‚ĪŸ Ī±Ī¼Ī±Ī¾Ī¬Ļ‚
ĪŸ Ī±Ī¼Ī±Ī¾Ī¬Ļ‚
Ā 
Ī Ļ…ĻĻĪÆĻ‡Ī¹ĪæĻ‚ Ļ‡ĪæĻĻŒĻ‚
Ī Ļ…ĻĻĪÆĻ‡Ī¹ĪæĻ‚ Ļ‡ĪæĻĻŒĻ‚Ī Ļ…ĻĻĪÆĻ‡Ī¹ĪæĻ‚ Ļ‡ĪæĻĻŒĻ‚
Ī Ļ…ĻĻĪÆĻ‡Ī¹ĪæĻ‚ Ļ‡ĪæĻĻŒĻ‚
Ā 
Ļ€ĻĪæĻ€Ī±ĻĪæĪ¾Ļ…Ļ„ĪæĪ½Ī± Ī±ĻĻƒĪµĪ½Ī¹ĪŗĪ± ĻƒĪµ ĪæĻ‚
Ļ€ĻĪæĻ€Ī±ĻĪæĪ¾Ļ…Ļ„ĪæĪ½Ī±  Ī±ĻĻƒĪµĪ½Ī¹ĪŗĪ± ĻƒĪµ  ĪæĻ‚Ļ€ĻĪæĻ€Ī±ĻĪæĪ¾Ļ…Ļ„ĪæĪ½Ī±  Ī±ĻĻƒĪµĪ½Ī¹ĪŗĪ± ĻƒĪµ  ĪæĻ‚
Ļ€ĻĪæĻ€Ī±ĻĪæĪ¾Ļ…Ļ„ĪæĪ½Ī± Ī±ĻĻƒĪµĪ½Ī¹ĪŗĪ± ĻƒĪµ ĪæĻ‚
Ā 

Similar to Reconnaissance Security Use Case

Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide	Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide Protect724manoj
Ā 
Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide	Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide Protect724manoj
Ā 
Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide	Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide Protect724manoj
Ā 
VPN Monitoring Security Use Case Guide version 1.1
VPN Monitoring Security Use Case Guide version 1.1	VPN Monitoring Security Use Case Guide version 1.1
VPN Monitoring Security Use Case Guide version 1.1 Protect724manoj
Ā 
IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide	IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide Protect724manoj
Ā 
Brute Force Attack Security Use Case Guide
Brute Force Attack Security Use Case Guide	Brute Force Attack Security Use Case Guide
Brute Force Attack Security Use Case Guide Protect724manoj
Ā 
Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide Protect724manoj
Ā 
Intrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8cIntrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8cProtect724migration
Ā 
Workflow Standard Content Guide for ESM 6.8c
Workflow Standard Content Guide for ESM 6.8cWorkflow Standard Content Guide for ESM 6.8c
Workflow Standard Content Guide for ESM 6.8cProtect724migration
Ā 
Netflow Monitoring Standard Content Guide for ESM 6.8c
Netflow Monitoring Standard Content Guide for ESM 6.8cNetflow Monitoring Standard Content Guide for ESM 6.8c
Netflow Monitoring Standard Content Guide for ESM 6.8cProtect724migration
Ā 
Logger Brute Force Attack Detection Security Use Case User's Guide
Logger Brute Force Attack Detection Security Use Case User's GuideLogger Brute Force Attack Detection Security Use Case User's Guide
Logger Brute Force Attack Detection Security Use Case User's Guideprotect724rkeer
Ā 
IPv6 Standard Content Guide for ESM 6.8c
IPv6 Standard Content Guide for ESM 6.8cIPv6 Standard Content Guide for ESM 6.8c
IPv6 Standard Content Guide for ESM 6.8cProtect724migration
Ā 
Release Notes for Risk Insight 1.1
Release Notes for Risk Insight 1.1Release Notes for Risk Insight 1.1
Release Notes for Risk Insight 1.1Protect724gopi
Ā 
Configuration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cConfiguration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cProtect724migration
Ā 
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...Protect724migration
Ā 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docxRajAmbere1
Ā 
Esm scg workflow_6.0c
Esm scg workflow_6.0cEsm scg workflow_6.0c
Esm scg workflow_6.0cProtect724v3
Ā 
ESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfProtect724v3
Ā 
Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cProtect724migration
Ā 
Cisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cCisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cProtect724migration
Ā 

Similar to Reconnaissance Security Use Case (20)

Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide	Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide
Ā 
Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide	Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide
Ā 
Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide	Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide
Ā 
VPN Monitoring Security Use Case Guide version 1.1
VPN Monitoring Security Use Case Guide version 1.1	VPN Monitoring Security Use Case Guide version 1.1
VPN Monitoring Security Use Case Guide version 1.1
Ā 
IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide	IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide
Ā 
Brute Force Attack Security Use Case Guide
Brute Force Attack Security Use Case Guide	Brute Force Attack Security Use Case Guide
Brute Force Attack Security Use Case Guide
Ā 
Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide
Ā 
Intrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8cIntrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8c
Ā 
Workflow Standard Content Guide for ESM 6.8c
Workflow Standard Content Guide for ESM 6.8cWorkflow Standard Content Guide for ESM 6.8c
Workflow Standard Content Guide for ESM 6.8c
Ā 
Netflow Monitoring Standard Content Guide for ESM 6.8c
Netflow Monitoring Standard Content Guide for ESM 6.8cNetflow Monitoring Standard Content Guide for ESM 6.8c
Netflow Monitoring Standard Content Guide for ESM 6.8c
Ā 
Logger Brute Force Attack Detection Security Use Case User's Guide
Logger Brute Force Attack Detection Security Use Case User's GuideLogger Brute Force Attack Detection Security Use Case User's Guide
Logger Brute Force Attack Detection Security Use Case User's Guide
Ā 
IPv6 Standard Content Guide for ESM 6.8c
IPv6 Standard Content Guide for ESM 6.8cIPv6 Standard Content Guide for ESM 6.8c
IPv6 Standard Content Guide for ESM 6.8c
Ā 
Release Notes for Risk Insight 1.1
Release Notes for Risk Insight 1.1Release Notes for Risk Insight 1.1
Release Notes for Risk Insight 1.1
Ā 
Configuration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cConfiguration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8c
Ā 
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
Ā 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
Ā 
Esm scg workflow_6.0c
Esm scg workflow_6.0cEsm scg workflow_6.0c
Esm scg workflow_6.0c
Ā 
ESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdf
Ā 
Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8c
Ā 
Cisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cCisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8c
Ā 

More from Protect724manoj

ArcSight Forwarding Connector Configuration Guide
ArcSight Forwarding Connector Configuration Guide	ArcSight Forwarding Connector Configuration Guide
ArcSight Forwarding Connector Configuration Guide Protect724manoj
Ā 
ArcSight Logger Forwarding Connector for HP Operations Manager
ArcSight Logger Forwarding Connector for HP Operations Manager	ArcSight Logger Forwarding Connector for HP Operations Manager
ArcSight Logger Forwarding Connector for HP Operations Manager Protect724manoj
Ā 
ArcSight Logger Forwarding Connector for HP Operations Manager i
ArcSight Logger Forwarding Connector for HP Operations Manager i	ArcSight Logger Forwarding Connector for HP Operations Manager i
ArcSight Logger Forwarding Connector for HP Operations Manager i Protect724manoj
Ā 
ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i	ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i Protect724manoj
Ā 
Forwarding Connector Configuration Guide 5.1.7.6085
Forwarding Connector Configuration Guide 5.1.7.6085	Forwarding Connector Configuration Guide 5.1.7.6085
Forwarding Connector Configuration Guide 5.1.7.6085 Protect724manoj
Ā 
ArcSight Logger Forwarding Connector for HP NNMi Configuration Guide 5.1.7.6081
ArcSight Logger Forwarding Connector for HP NNMi Configuration Guide 5.1.7.6081	ArcSight Logger Forwarding Connector for HP NNMi Configuration Guide 5.1.7.6081
ArcSight Logger Forwarding Connector for HP NNMi Configuration Guide 5.1.7.6081 Protect724manoj
Ā 
ArcSight Logger Forwarding Connector for HP OM Configuration Guide 5.1.7.6079
ArcSight Logger Forwarding Connector for HP OM Configuration Guide 5.1.7.6079	ArcSight Logger Forwarding Connector for HP OM Configuration Guide 5.1.7.6079
ArcSight Logger Forwarding Connector for HP OM Configuration Guide 5.1.7.6079 Protect724manoj
Ā 
ArcSight Logger Forwarding Connector for HP OMi Configuration Guide 5.1.7.6080
ArcSight Logger Forwarding Connector for HP OMi Configuration Guide 5.1.7.6080	ArcSight Logger Forwarding Connector for HP OMi Configuration Guide 5.1.7.6080
ArcSight Logger Forwarding Connector for HP OMi Configuration Guide 5.1.7.6080 Protect724manoj
Ā 
HP ArcSight Logger Forwarding Connector for HP NNMI Configuration Guide 5.2.1...
HP ArcSight Logger Forwarding Connector for HP NNMI Configuration Guide 5.2.1...HP ArcSight Logger Forwarding Connector for HP NNMI Configuration Guide 5.2.1...
HP ArcSight Logger Forwarding Connector for HP NNMI Configuration Guide 5.2.1...Protect724manoj
Ā 
ArcSight Logger Forwarding Connector for HP NNMi 5.2.3.6287.0 Configuration G...
ArcSight Logger Forwarding Connector for HP NNMi 5.2.3.6287.0 Configuration G...ArcSight Logger Forwarding Connector for HP NNMi 5.2.3.6287.0 Configuration G...
ArcSight Logger Forwarding Connector for HP NNMi 5.2.3.6287.0 Configuration G...Protect724manoj
Ā 
Logger Forwarding Connector for HPE NNMi Release Notes 7.1.7.7609.0
Logger Forwarding Connector for HPE NNMi Release Notes 7.1.7.7609.0	Logger Forwarding Connector for HPE NNMi Release Notes 7.1.7.7609.0
Logger Forwarding Connector for HPE NNMi Release Notes 7.1.7.7609.0 Protect724manoj
Ā 
Logger Forwarding Connector for HPE NNMi Configuration Guide 7.1.7.7609.0
Logger Forwarding Connector for HPE NNMi Configuration Guide 7.1.7.7609.0	Logger Forwarding Connector for HPE NNMi Configuration Guide 7.1.7.7609.0
Logger Forwarding Connector for HPE NNMi Configuration Guide 7.1.7.7609.0 Protect724manoj
Ā 
Logger Forwarding Connector for HPE OM Release Notes 7.1.7.7611.0
Logger Forwarding Connector for HPE OM Release Notes 7.1.7.7611.0	Logger Forwarding Connector for HPE OM Release Notes 7.1.7.7611.0
Logger Forwarding Connector for HPE OM Release Notes 7.1.7.7611.0 Protect724manoj
Ā 
Logger Forwarding Connector for HPE OM Configuration Guide 7.1.7.7611.0
Logger Forwarding Connector for HPE OM Configuration Guide 7.1.7.7611.0	Logger Forwarding Connector for HPE OM Configuration Guide 7.1.7.7611.0
Logger Forwarding Connector for HPE OM Configuration Guide 7.1.7.7611.0 Protect724manoj
Ā 
Logger Forwarding Connector for HPE OMi Release Notes 7.1.7.7610
Logger Forwarding Connector for HPE OMi Release Notes 7.1.7.7610	Logger Forwarding Connector for HPE OMi Release Notes 7.1.7.7610
Logger Forwarding Connector for HPE OMi Release Notes 7.1.7.7610 Protect724manoj
Ā 
Logger Forwarding Connector for HPE OMi Configuration Guide 7.1.7.7610.0
Logger Forwarding Connector for HPE OMi Configuration Guide 7.1.7.7610.0	Logger Forwarding Connector for HPE OMi Configuration Guide 7.1.7.7610.0
Logger Forwarding Connector for HPE OMi Configuration Guide 7.1.7.7610.0 Protect724manoj
Ā 
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Release Notes
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Release Notes	Logger Forwarding Connector for NNMi 7.3.0.7837.0 Release Notes
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Release Notes Protect724manoj
Ā 
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Configuration Guide
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Configuration Guide	Logger Forwarding Connector for NNMi 7.3.0.7837.0 Configuration Guide
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Configuration Guide Protect724manoj
Ā 
Logger Forwarding Connector for OM 7.3.0.7838.0 Release Notes
Logger Forwarding Connector for OM 7.3.0.7838.0 Release Notes	Logger Forwarding Connector for OM 7.3.0.7838.0 Release Notes
Logger Forwarding Connector for OM 7.3.0.7838.0 Release Notes Protect724manoj
Ā 
Logger Forwarding Connector for OM 7.3.0.7838.0 Configuration Guide
Logger Forwarding Connector for OM 7.3.0.7838.0 Configuration Guide	Logger Forwarding Connector for OM 7.3.0.7838.0 Configuration Guide
Logger Forwarding Connector for OM 7.3.0.7838.0 Configuration Guide Protect724manoj
Ā 

More from Protect724manoj (20)

ArcSight Forwarding Connector Configuration Guide
ArcSight Forwarding Connector Configuration Guide	ArcSight Forwarding Connector Configuration Guide
ArcSight Forwarding Connector Configuration Guide
Ā 
ArcSight Logger Forwarding Connector for HP Operations Manager
ArcSight Logger Forwarding Connector for HP Operations Manager	ArcSight Logger Forwarding Connector for HP Operations Manager
ArcSight Logger Forwarding Connector for HP Operations Manager
Ā 
ArcSight Logger Forwarding Connector for HP Operations Manager i
ArcSight Logger Forwarding Connector for HP Operations Manager i	ArcSight Logger Forwarding Connector for HP Operations Manager i
ArcSight Logger Forwarding Connector for HP Operations Manager i
Ā 
ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i	ArcSight Logger Forwarding Connector for HP Network Node Manager i
ArcSight Logger Forwarding Connector for HP Network Node Manager i
Ā 
Forwarding Connector Configuration Guide 5.1.7.6085
Forwarding Connector Configuration Guide 5.1.7.6085	Forwarding Connector Configuration Guide 5.1.7.6085
Forwarding Connector Configuration Guide 5.1.7.6085
Ā 
ArcSight Logger Forwarding Connector for HP NNMi Configuration Guide 5.1.7.6081
ArcSight Logger Forwarding Connector for HP NNMi Configuration Guide 5.1.7.6081	ArcSight Logger Forwarding Connector for HP NNMi Configuration Guide 5.1.7.6081
ArcSight Logger Forwarding Connector for HP NNMi Configuration Guide 5.1.7.6081
Ā 
ArcSight Logger Forwarding Connector for HP OM Configuration Guide 5.1.7.6079
ArcSight Logger Forwarding Connector for HP OM Configuration Guide 5.1.7.6079	ArcSight Logger Forwarding Connector for HP OM Configuration Guide 5.1.7.6079
ArcSight Logger Forwarding Connector for HP OM Configuration Guide 5.1.7.6079
Ā 
ArcSight Logger Forwarding Connector for HP OMi Configuration Guide 5.1.7.6080
ArcSight Logger Forwarding Connector for HP OMi Configuration Guide 5.1.7.6080	ArcSight Logger Forwarding Connector for HP OMi Configuration Guide 5.1.7.6080
ArcSight Logger Forwarding Connector for HP OMi Configuration Guide 5.1.7.6080
Ā 
HP ArcSight Logger Forwarding Connector for HP NNMI Configuration Guide 5.2.1...
HP ArcSight Logger Forwarding Connector for HP NNMI Configuration Guide 5.2.1...HP ArcSight Logger Forwarding Connector for HP NNMI Configuration Guide 5.2.1...
HP ArcSight Logger Forwarding Connector for HP NNMI Configuration Guide 5.2.1...
Ā 
ArcSight Logger Forwarding Connector for HP NNMi 5.2.3.6287.0 Configuration G...
ArcSight Logger Forwarding Connector for HP NNMi 5.2.3.6287.0 Configuration G...ArcSight Logger Forwarding Connector for HP NNMi 5.2.3.6287.0 Configuration G...
ArcSight Logger Forwarding Connector for HP NNMi 5.2.3.6287.0 Configuration G...
Ā 
Logger Forwarding Connector for HPE NNMi Release Notes 7.1.7.7609.0
Logger Forwarding Connector for HPE NNMi Release Notes 7.1.7.7609.0	Logger Forwarding Connector for HPE NNMi Release Notes 7.1.7.7609.0
Logger Forwarding Connector for HPE NNMi Release Notes 7.1.7.7609.0
Ā 
Logger Forwarding Connector for HPE NNMi Configuration Guide 7.1.7.7609.0
Logger Forwarding Connector for HPE NNMi Configuration Guide 7.1.7.7609.0	Logger Forwarding Connector for HPE NNMi Configuration Guide 7.1.7.7609.0
Logger Forwarding Connector for HPE NNMi Configuration Guide 7.1.7.7609.0
Ā 
Logger Forwarding Connector for HPE OM Release Notes 7.1.7.7611.0
Logger Forwarding Connector for HPE OM Release Notes 7.1.7.7611.0	Logger Forwarding Connector for HPE OM Release Notes 7.1.7.7611.0
Logger Forwarding Connector for HPE OM Release Notes 7.1.7.7611.0
Ā 
Logger Forwarding Connector for HPE OM Configuration Guide 7.1.7.7611.0
Logger Forwarding Connector for HPE OM Configuration Guide 7.1.7.7611.0	Logger Forwarding Connector for HPE OM Configuration Guide 7.1.7.7611.0
Logger Forwarding Connector for HPE OM Configuration Guide 7.1.7.7611.0
Ā 
Logger Forwarding Connector for HPE OMi Release Notes 7.1.7.7610
Logger Forwarding Connector for HPE OMi Release Notes 7.1.7.7610	Logger Forwarding Connector for HPE OMi Release Notes 7.1.7.7610
Logger Forwarding Connector for HPE OMi Release Notes 7.1.7.7610
Ā 
Logger Forwarding Connector for HPE OMi Configuration Guide 7.1.7.7610.0
Logger Forwarding Connector for HPE OMi Configuration Guide 7.1.7.7610.0	Logger Forwarding Connector for HPE OMi Configuration Guide 7.1.7.7610.0
Logger Forwarding Connector for HPE OMi Configuration Guide 7.1.7.7610.0
Ā 
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Release Notes
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Release Notes	Logger Forwarding Connector for NNMi 7.3.0.7837.0 Release Notes
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Release Notes
Ā 
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Configuration Guide
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Configuration Guide	Logger Forwarding Connector for NNMi 7.3.0.7837.0 Configuration Guide
Logger Forwarding Connector for NNMi 7.3.0.7837.0 Configuration Guide
Ā 
Logger Forwarding Connector for OM 7.3.0.7838.0 Release Notes
Logger Forwarding Connector for OM 7.3.0.7838.0 Release Notes	Logger Forwarding Connector for OM 7.3.0.7838.0 Release Notes
Logger Forwarding Connector for OM 7.3.0.7838.0 Release Notes
Ā 
Logger Forwarding Connector for OM 7.3.0.7838.0 Configuration Guide
Logger Forwarding Connector for OM 7.3.0.7838.0 Configuration Guide	Logger Forwarding Connector for OM 7.3.0.7838.0 Configuration Guide
Logger Forwarding Connector for OM 7.3.0.7838.0 Configuration Guide
Ā 

Recently uploaded

(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...gurkirankumar98700
Ā 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
Ā 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
Ā 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
Ā 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
Ā 
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
Ā 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
Ā 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
Ā 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
Ā 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
Ā 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
Ā 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
Ā 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
Ā 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
Ā 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
Ā 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto GonzƔlez Trastoy
Ā 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
Ā 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
Ā 

Recently uploaded (20)

(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
Ā 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
Ā 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
Ā 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
Ā 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
Ā 
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
Ā 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Ā 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Ā 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Ā 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
Ā 
Call Girls In Mukherjee Nagar šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Call Girls In Mukherjee Nagar šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...Call Girls In Mukherjee Nagar šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Call Girls In Mukherjee Nagar šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Ā 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
Ā 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Ā 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
Ā 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
Ā 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
Ā 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Ā 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Ā 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
Ā 

Reconnaissance Security Use Case

  • 1. HPE SecurityĀ ArcSightĀ ESM: Reconnaissance Software Version: 1.0 Security Use Case Guide April 3, 2017
  • 2. Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. The network information used in the examples in this document (including IP addresses and hostnames) is for illustration purposes only. HPE Security ArcSight products are highly flexible and function as you configure them. The accessibility, integrity, and confidentiality of your data is your responsibility. Implement a comprehensive security strategy and follow good security practices. This document is confidential. Restricted Rights Legend Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice Ā© Copyright 2016 Hewlett Packard Enterprise Development, LP Follow this link to see a complete statement of copyrights and acknowledgements: https://www.protect724.hpe.com/docs/DOC-13026 Support Phone Alistof phone numbers is available on the HPE Security ArcSightTechnical Support Page:Ā https://softwaresupport.hpe.com/documents/10180/14684/esp-support- contact-list Support Web Site https://softwaresupport.hpe.com Protect 724 Community https://www.protect724.hpe.com Contact Information Security Use Case Guide HPE ESM: Reconnaissance 1.0 Page 2 of 33
  • 3. Contents Chapter 1: Overview 4 Chapter 2: Installation 6 Importing and Installing a Package 7 Assigning User Permissions 8 Chapter 3: Configuration 9 Chapter 4: Getting Started with the Reconnaissance Monitoring Dashboard 11 Chapter 5: Monitoring the Reconnaissance Activity Active Channel 13 Chapter 6: Monitoring Internal Scanners 15 Using the Internal Scanner Activity Data Monitor 15 Using the Top Traffic from Internal Scanners Data Monitor 18 Chapter 7: Monitoring Scanned Hosts 22 Using the Critical Hosts Scanned Data Monitor 22 Using the Top Critical Hosts Scanned by External Source Data Monitor 25 Using the Top Internal Scanned Hosts Data Monitor 28 Chapter 8: Refining the Reconnaissance from Internal Sources Rule 31 Send Documentation Feedback 33 HPE ESM: Reconnaissance 1.0 Page 3 of 33
  • 4. Chapter 1: Overview Reconnaissance is an information-gathering activity that scans for vulnerabilities in your network. Scans can come from external or internal source; and they target either hosts, or ports on a host. An abundance of this activity can indicate an eminent attack, when a vulnerability is found. The Reconnaissance Security Use Case monitors such activities and displays them on data monitors and an active channel, which you access from the dashboard. The information collected by the use case helps you investigate, then take actions on scanners and the scanned critical hosts. The Reconnaissance use case contains the following resources: l A dashboard (Reconnaissance Monitoring) is your starting point to monitor reconnaissance activities. The dashboard provides access to the data monitors that show information on targeted critical hosts, internal scanners, and top traffic activity. l An active channel (Reconnaissance Activity) shows all reconnaissance events within a given timeframe. l A rule (Reconnaissance from Internal Source) looks for reconnaissance activity from internal sources. Information is written to two active lists. You can further configure this rule to send notifications and create cases. HPE ESM: Reconnaissance 1.0 Page 4 of 33
  • 5. Access the Reconnaissance use case from the Use Cases tab of the ArcSight Console Navigator panel. The Monitor section of the use case lists the dashboard and the active channel used to monitor and investigate reconnaissance activity. The Library section of the use case lists all supporting resources that help collect information that goes on the dashboard and active channel. The use case also provides a configuration wizard that guides you through required configuration. This document describes how to install, configure, and use the Reconnaisance use case and is designed for security professionals who have a basic understanding of ArcSight ESM and are familiar with the ArcSight Console. For detailed information about using ArcSight ESM, see the ArcSight ESM help system from the ArcSight Console Help menu. Find PDFs of all ArcSight documentation on Protect 724. Note: With regard to reconnaissance activities, the source is the scanner address and the destination is the scanned host. Security Use Case Guide Chapter 1: Overview HPE ESM: Reconnaissance 1.0 Page 5 of 33
  • 6. Chapter 2: Installation To install the Reconnaissance use case, perform the following tasks in the prescribed sequence: 1. Download the Reconnaissance use case zip file from the ArcSight Marketplace into the ArcSight Console system where you plan to install the use case. Extract the zip file. 2. Log into the ArcSight Console as administrator. Note: During the package installation process, do not use the same administrator account to start another Console or Command Center session simultaneously. This login is locked until the package installation is completed. 3. Verify if you have a previous version of the use case package you want to install. If so, uninstall and delete this previous version: a. On the Packages tab of the Navigator panel, right-click the package and select Uninstall Package. The package icon is gray when it is uninstalled. b. Right-click the package and select Delete Package. 4. On the Packages tab, verify if Downloads Groups is already installed. If you see packages in /All Packages/Downloads/Downloads Groups, then ignore this step. If the Downloads Groups package is not present, import and install the Downloads_Groups_1.0.arb package. See "Importing and Installing a Package" on the next page for details. 5. Import and install the Reconnaissance use case package. See "Importing and Installing a Package" on the next page for details. 6. Assign user permissions to the Reconnaissance resources. See "Assigning User Permissions" on pageĀ 8 for details. HPE ESM: Reconnaissance 1.0 Page 6 of 33
  • 7. Importing and Installing a Package This procedure assumes you have downloaded the zip file and extracted the contents into the ArcSight Console system. You must have administrator privileges to perform the tasks. l If the ArcSight Console does not have the Downloads Groups package in /All Packages/Downloads/Downloads Groups, import and install that package first. Then repeat the steps to import and install the Reconnaissance use case package. Note: The Downloads Groups package contains the groups used by the resources in the security use case; you must import and install this package first. l If the Downloads Groups package is already installed, follow the steps to import and install the Reconnaissance use case package only. To import and install a package: 1. Log into the ArcSight Console as administrator. In the Navigator panel, click the Packages tab. 2. Click Import. 3. In the Open dialog, browse and select the Reconnaissance_1.0.arb package file you want to import, then click Open. The Importing Packages dialog shows how the package import is being verified for any resource conflicts. 4. In the Packages for Installation dialog, make sure that the check box is selected next to the name of the package you want to install and click Next. The Progress tab shows how the installation is progressing. When the installation is complete, the Results tab displays the summary report. 5. In the Installing Packages dialog, click OK. In the Importing Packages dialog, click OK. 6. On the Packages tab of the Navigator panel, expand the package group in /All Packages/Downloads/ to verify that the package group is populated and that installation is successful. Security Use Case Guide Chapter 2: Installation HPE ESM: Reconnaissance 1.0 Page 7 of 33
  • 8. Assigning User Permissions By default, users in the Administrators and Default User Groups/Analyzer Administrators user groups can view and edit ESM resources. Users in the Default User Groups (and any custom user group under this group) can only view Reconnaissance resources. Depending on how you set up user access controls within your organization, you might need to adjust those controls to make sure the resources are accessible to the authorized users. Note: By default, the Default User Groups/Analyzer Administrators user group does not have edit permissions for archived reports in the Downloads group. The following procedure assumes that you have logged into the ArcSight Console as administrator, and that you have set up the required user groups with the authorized users. To assign user permissions: 1. In the Navigator panel, open the Resources tab. 2. For each of the resource types provided in the use case, navigate to Downloads/Hostile Activity Detection. 3. Right-click the Reconnaissance group and select Edit Access Control to open the ACL editor in the Inspect/Edit panel. 4. Select the user groups for which you want to grant permissions and click OK. Security Use Case Guide Chapter 2: Installation HPE ESM: Reconnaissance 1.0 Page 8 of 33
  • 9. Chapter 3: Configuration Before configuring the use case, make sure that you have populated your ESM network model. A network model keeps track of the network nodes participating in the event traffic. For information about populating the network model, refer to the ArcSight Console Userā€™s Guide. The Reconnaissance use case requires the following configurations for your environment: l SmartConnectors: Install the appropriate ArcSight SmartConnectors to receive relevant events from your antivirus server. Examples are SmartConnectors for McAfee ePolicy Orchestrator DB and for Symantec AntiVirus Corporate Edition File. o Refer to the applicable SmartConnector guide for installation instructions. o Refer to the ArcSight Console User's Guide for instructions to register SmartConnectors in ESM. l Asset categorization: Manually categorize all internal assets (assets inside the company network), or the zones to which the assets belong, with the Protected asset category. This category is located in /All Asset Categories/Site Asset Categories/Address Spaces/Protected). Assets that are not categorized as internal to the network are considered to be external. Make sure that you also categorize assets that have public addresses but are controlled by the organization (such as Web servers) as Protected. In addition, configure which protected assets belong to either /All Asset Categories/System Asset Categories/Criticality/Very High or /All Asset Categories/System Asset Categories/Criticality/High. Refer to the topic, "Managing Asset Categories," in the ArcSight Console User's Guide. Note: You must categorize assets internal to the network manually; the procedure is not part of the use case configuration wizard. To configure the Reconnaissance use case: 1. In the Navigator panel, click the Use Cases tab. 2. Go to the Reconnaissance use case located in /All Use Cases/Downloads/Hostile Activity Detection. 3. Open the Reconnaissance use case: double-click the use case, or right-click the use case and select Open Use Case. The Reconnaissance use case lists all the resources used for monitoring reconnaissance activity. HPE ESM: Reconnaissance 1.0 Page 9 of 33
  • 10. 4. Click the Configure button to open the configuration wizard. 5. Click Next to follow the configuration steps. After you configure the Reconnaissance use case, you are ready to monitor reconnaissance activity. See "Getting Started with the Reconnaissance Monitoring Dashboard" on pageĀ 11. Security Use Case Guide Chapter 3: Configuration HPE ESM: Reconnaissance 1.0 Page 10 of 33
  • 11. Chapter 4: Getting Started with the Reconnaissance Monitoring Dashboard The Reconnaissance use case provides a dashboard to help you detect reconnaissance activities. Use this dashboard as a starting point for monitoring traffic scans into your network. To open the dashboard, click the link for the dashboard in the Reconnaissance use case. The dashboard opens in the Viewer panel of the ArcSight Console. HPE ESM: Reconnaissance 1.0 Page 11 of 33
  • 12. Following is an example of the dashboard: The Reconnaissance Monitoring dashboard includes the following data monitors, from top left, clockwise: l Critical Hosts Scanned Refer to "Using the Critical Hosts Scanned Data Monitor" on pageĀ 22 for details. l Internal Scanner Activity Refer to "Using the Internal Scanner Activity Data Monitor" on pageĀ 15 for details. l Top Critical Hosts Scanned by External Sources Refer to "Using the Top Critical Hosts Scanned by External Source Data Monitor" on pageĀ 25 for details. l Top Traffic from Internal Scanners Refer to "Using the Top Traffic from Internal Scanners Data Monitor" on pageĀ 18 for details. l Top Internal Scanned Hosts Refer to "Using the Top Internal Scanned Hosts Data Monitor" on pageĀ 28 for details. Security Use Case Guide Chapter 4: Getting Started with the Reconnaissance Monitoring Dashboard HPE ESM: Reconnaissance 1.0 Page 12 of 33
  • 13. Chapter 5: Monitoring the Reconnaissance Activity Active Channel The active channel displays high-level information on all reconnaissance (attempts or successes) from all sources to all destinations. To open the active channel, click the link on the Reconnaissance use case: Following is an example of the Reconnaissance Activity active channel: HPE ESM: Reconnaissance 1.0 Page 13 of 33
  • 14. To view the active channel: l On the Reconnaissance use case's Active Channels section, click the Reconnaissance Activity link, Or l On the Navigator > Resources panel: a. Go to /All Active Channels/Downloads/Hostile Activity Detection/Reconnaisance. b. Right-click Reconnaissance Activity and select Show Active Channel. To use the active channel: l Right-click an item (such as an IP address) and select Show Event Details to see detailed information about the event. You can also create an inline filter to display events from a specific item. See the ArcSight Console User's Guide's topic on using active channels for information about menu options and inline filters. l Right-click on an event and select Export. Then select one of the available export options. Refer to the ArcSight Console User's Guide's topic, "Exporting Events to a File," for more information. Note: The events displayed in an active channel do not refresh automatically at ten-minute intervals. To refresh the view, click the Stop and Replay channel controls in the toolbar. Depending on your environment, ESM load, and specific investigation needs, you can configure an active channel to use continuous, automatic channel refresh: Right-click the link for the active channel in the use case and select Edit Active Channel. From the Time Parameters drop-down on the Attributes tab of the Inspect/Edit panel, select Continuously evaluate. Note: In a high EPS environment, you might see performance issues if you scroll down to try and view all the events in the active channel. Security Use Case Guide Chapter 5: Monitoring the Reconnaissance Activity Active Channel HPE ESM: Reconnaissance 1.0 Page 14 of 33
  • 15. Chapter 6: Monitoring Internal Scanners This chapter provides information about reconnaissance scans coming from within your network. While you expect internal network activity to be routine, you need to differentiate between legitimate access and suspicious scans from sources that are not authorized to access certain hosts. The ArcSight resources for monitoring internal scanners help you identify internal scanners for further investigation. Suspicious scans from unauthorized internal sources might indicate that the internal scanner has been compromised and may be used for real attacks. The following topics are covered: l "Using the Internal Scanner Activity Data Monitor" below l "Using the Top Traffic from Internal Scanners Data Monitor" on pageĀ 18 Using the Internal Scanner Activity Data Monitor The Internal Scanner Activity data monitor tracks scans from internal sources to the destination hosts, all occurring within the network. These hosts reside within the protected address spaces. The Internal Scanner Activity data monitor is updated every 60 seconds and shows each source that sent a maximum of 1000 scans to protected hosts. HPE ESM: Reconnaissance 1.0 Page 15 of 33
  • 16. Following is a partial view of the data monitor: To view the Internal Scanner Activity data monitor: l On the Reconnaissance use case's Dashboards section, click the link to the dashboard, Reconnaissance Monitoring. Or l On the Navigator > Resources panel: a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaisance. b. Right-click Reconnaissance Monitoring and select Show Dashboard. The Internal Scanner Activity data monitor is displayed on the top right of the Reconnaissance Monitoring dashboard. To interpret the Internal Scanner Activity data monitor: l The data monitor uses a hierarchical layout of nodes. l Red nodes represent scanner (source) addresses. Security Use Case Guide Chapter 6: Monitoring Internal Scanners HPE ESM: Reconnaissance 1.0 Page 16 of 33
  • 17. l Turquoise nodes represent the event name as sent by the device (for example, a firewall might show permit, accept, or drop). l White nodes represent the hosts' (destinations) addresses. l Blue nodes can sometimes appear between a red and white squares. A blue node indicates that a chain of scans has occurred, with the blue node as the intermediate scanner. Tip: Try these: l Zoom in on a particular area especially if the data monitor is displaying many nodes. l Click the circular layout button ( ) on the toolbar for a different arrangement of the nodes. Further investigations on the Internal Scanner Activity data monitor: The activity shown on this data monitor includes routine traffic as well as questionable ones. l Right-click on a square node (either a source or destination) and choose Show Events. The Console displays the Internal Scanner Activity active channel, with end time evaluated hourly. Use this channel to determine information about the specific node. l Right-click on a circle (an event name) and choose Show Events. The circle represents the event name. If you chose to show events on a specific event name, you can use the information on the Internal Scanner Activity active channel to determine source addresses of internal scanners. Refer to the following topics in the ArcSight Console User's Guide : o The "Reference Guide" section for descriptions of the different categories displayed on the active channel o The "Investigating Views" topic for various ways to use the right-click Investigate option l Focus on the source addresses (the internal scanners). Are those scanners authorized to access the destination? For the unauthorized internal scanners, who are the users assigned to those internal scanners? To fine tune the Internal Scanner Activity data monitor: ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself has default parameters that determine the time buckets. Caution: If making changes to any parameters, you must be familiar with factors that affect ESM performance resulting from these changes. You must also know how to edit ESM resources, such as modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for details. Security Use Case Guide Chapter 6: Monitoring Internal Scanners HPE ESM: Reconnaissance 1.0 Page 17 of 33
  • 18. Data monitor l Availability Interval: Default is 60 seconds in which the data monitor is updated. You can increase or reduce this number. l Max Event Count: Default is 1000 scans. You can increase or decrease the number depending on investigative needs. To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This opens the data monitor's Edit panel. The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on "Event Graph Data Monitor" for details. Filter used by the data monitor Change the filter conditions to suit your business requirements. The filter is located in /All Filters/Downloads/Hostile Activity Detection/Reconnaissance/Internal Scanner Hosts. Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to filter conditions will affect the expected results in all resources using the filter. Refer to the User's Guide's topic on "Filtering Events" for details. Using the Top Traffic from Internal Scanners Data Monitor This data monitor shows the internal sources that generated the most scans in the last 6 hours. The data monitor is updated every 60 seconds. Security Use Case Guide Chapter 6: Monitoring Internal Scanners HPE ESM: Reconnaissance 1.0 Page 18 of 33
  • 19. Following is a closeup of the data monitor. To view the Top Traffic from Internal Scanners data monitor: l On the Reconnaissance use case's Dashboards section, click the link to the dashboard, Reconnaissance Monitoring. Or l On the Navigator > Resources panel: a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaissance. b. Right-click Reconnaissance Monitoring and select Show Dashboard. The Top Traffic from Internal Scanners data monitor is located on the bottom center of the dashboard. Use this data monitor to get an overview of the most active internal scanners within your network. To interpret the Top Traffic from Internal Scanners data monitor: l Each vertical bar on the chart represents one internal scanner, with the leftmost bar representing the scanner that generated the most traffic. Security Use Case Guide Chapter 6: Monitoring Internal Scanners HPE ESM: Reconnaissance 1.0 Page 19 of 33
  • 20. l By default, the data monitor displays the top 10 internal scanners. The legend shows the total events per scanner with the highest number on top. The legend labeled "others" is a sum of events from the remaining scanners not belonging to the top 10. Further investigations on the Top Traffic from Internal Scanners data monitor: Use this data monitor to determine the internal scanners suspected of actively checking hosts for vulnerabilities. This could indicate that these scanners have been compromised and may be even be used to launch real attacks. l Double-click on a chart element on the graph to open a channel specific to that element. Or right-click an element and choose Investigate. Then choose an option to suit your investigative needs. Tip: Refer to the following topics in the ArcSight Console User's Guide : o The "Reference Guide" section for descriptions of the different categories displayed on the active channel o The "Investigating Views" topic for various ways to use the right-click Investigate option To fine tune the Top Traffic from Internal Scanners data monitor: ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself has default parameters that determine the time buckets. Caution: If making changes to any parameters, you must be familiar with factors that affect ESM performance resulting from these changes. You must also know how to edit ESM resources, such as modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for details. Security Use Case Guide Chapter 6: Monitoring Internal Scanners HPE ESM: Reconnaissance 1.0 Page 20 of 33
  • 21. Data monitor l # top entries: Default is 10 top internal scanners. You can increase or reduce this number. l Bucket size in Seconds: Default is 600 seconds (10 minutes) per bucket. You can increase or decrease the size depending on investigative needs. l Number of Buckets: The default is 36 buckets, which means a time range of 360 minutes or 6 hours. You can increase or decrease the number depending on investigative needs. Note: If you want to change the time range of the data monitor, adjust the bucket size or number of buckets, or both. To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This opens the data monitor's Edit panel. The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on "Top Value Counts Data Monitor" for details. Filter used by the data monitor Change the filter conditions to suit your business requirements. The filter is located in /All Filters/Downloads/Hostile Activity Detection/Reconnaissance/Internal Scanner Hosts. Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to filter conditions will affect the expected results in all resources using the filter. Refer to the User's Guide's topic on "Filtering Events" for details. Security Use Case Guide Chapter 6: Monitoring Internal Scanners HPE ESM: Reconnaissance 1.0 Page 21 of 33
  • 22. Chapter 7: Monitoring Scanned Hosts This chapter provides information about critical hosts in your network that are being scanned for reconnaissance purposes. The following topics are covered: l "Using the Critical Hosts Scanned Data Monitor" below l "Using the Top Critical Hosts Scanned by External Source Data Monitor" on pageĀ 25 l "Using the Top Internal Scanned Hosts Data Monitor" on pageĀ 28 Using the Critical Hosts Scanned Data Monitor The Critical Hosts Scanned data monitor tracks, in real time, assets in your network that were scanned, either by external or internal sources. Specifically, these assets have a System Asset Category setting of either Very High or High criticality. Tip: An asset in your network model can be assigned various category settings. The hosts (assets) displayed on this data monitor would have one of these system asset category settings: l /All Asset Categories/System Asset Categories/Criticality/Very High or l /All Asset Categories/System Asset Categories/Criticality/High The above settings are found in an asset's Categories tab. The data monitor is updated every 60 seconds and shows each critical host that was scanned a maximum of 1000 times. HPE ESM: Reconnaissance 1.0 Page 22 of 33
  • 23. Following is a closeup of the data monitor: To view the Critical Hosts Scanned data monitor: l On the Reconnaissance use case's Dashboards section, click the link to the dashboard, Reconnaissance Monitoring. Or l On the Navigator > Resources panel: a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaissance. b. Right-click Reconnaissance Monitoring and select Show Dashboard. The Critical Hosts Scanned data monitor is displayed on the top left of the Reconnaissance Monitoring dashboard . To interpret the Critical Hosts Scanned data monitor: Red squares represent external source addresses; turquoise circles represent the event name as sent by the device (for example, a firewall might send Permit, accept, or drop events); and white squares Security Use Case Guide Chapter 7: Monitoring Scanned Hosts HPE ESM: Reconnaissance 1.0 Page 23 of 33
  • 24. represent the destination addresses of critical hosts in your network. On the top left of the example, you can see multiple sources targeting a single critical host. Further investigations on the Critical Hosts Scanned data monitor: Use this data monitor to determine which critical assets and their zones are of interest to the scanners. l Right-click on a square node (either a source or destination) and choose Show Events. The Console displays the Critical Hosts Scanned active channel, with end time evaluated hourly. Use this channel to determine information about the specific node. For example, if you chose to show events on a white node (the critical host destination), the active channel displays all incoming events on that host. l Right-click on a circle (an event name) and choose Show Events. The circle represents the event name. If you chose to show events on an accept event, you can use the information on the Critical Hosts Scanned active channel to determine source addresses whose scans were accepted by critical hosts. The channel displays information about the sources such as their zones, countries, and so on. Tip: Refer to the following topics in the ArcSight Console User's Guide : o The "Reference Guide" section for descriptions of the different categories displayed on the active channel o The "Investigating Views" topic for various ways to use the right-click Investigate option To fine tune the Critical Hosts Scanned data monitor: ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself has default parameters that determine the time buckets. Caution: If making changes to any parameters, you must be familiar with factors that affect ESM performance resulting from these changes. You must also know how to edit ESM resources, such as modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for details. Security Use Case Guide Chapter 7: Monitoring Scanned Hosts HPE ESM: Reconnaissance 1.0 Page 24 of 33
  • 25. Data monitor l Availability Interval: Default is 60 seconds in which the data monitor is updated. You can increase or reduce this number. l Max Event Count: Default is 1000 scans. You can increase or decrease the number depending on investigative needs. To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This opens the data monitor's Edit panel. The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on "Event Graph Data Monitor" for details. Filter used by the data monitor Change the filter conditions to suit your business requirements. The filter is located in /All Filters/Downloads/Hostile Activity Detection/Reconnaissance/Critical Assets Scanned. Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to filter conditions will affect the expected results in all resources using the filter. Refer to the User's Guide's topic on "Filtering Events" for details. Using the Top Critical Hosts Scanned by External Source Data Monitor This data monitor tracks the top critical assets that were scanned by external sources. While it is impossible to control external sources, with this data monitor, you have the ability to protect those critical assets before a real attack comes. The data monitor shows the top 10 critical hosts that were scanned a maximum of 1000 times. Information is updated every 60 seconds. Security Use Case Guide Chapter 7: Monitoring Scanned Hosts HPE ESM: Reconnaissance 1.0 Page 25 of 33
  • 26. Following is a closeup of the data monitor: To view the Top Critical Hosts Scanned by External Source data monitor: l On the Reconnaissance use case's Dashboards section, click the link to the dashboard, Reconnaissance Monitoring. Or l On the Navigator > Resources panel: a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaissance. b. Right-click Reconnaissance Monitoring and select Show Dashboard. The Top Critical Hosts Scanned by External Sources data monitor is displayed on the bottom left of the Reconnaissance Monitoring dashboard. To interpret the Top Critical Hosts Scanned by External Source data monitor: The vertical bars display the critical hosts with very high scan counts from outside sources. The host with the highest count is on the left. Security Use Case Guide Chapter 7: Monitoring Scanned Hosts HPE ESM: Reconnaissance 1.0 Page 26 of 33
  • 27. Further investigations on the Top Critical Hosts Scanned by External Source data monitor: Use this data monitor to determine which critical assets are being scanned the most, by external sources. l Double-click a chart element on the graph to open an active channel specific to that element. Or right-click a chart element and choose Investigate, then choose an option to suit your investigative needs. Refer to the following topics in the ArcSight Console User's Guide : o The "Reference Guide" section for descriptions of the different categories displayed on the active channel o The "Investigating Views" topic for various ways to use the right-click Investigate option To fine tune the Top Critical Hosts Scanned by External Sources data monitor: ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself has default parameters that determine the time buckets. Caution: If making changes to any parameters, you must be familiar with factors that affect ESM performance resulting from these changes. You must also know how to edit ESM resources, such as modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for details. Data monitor l # of top entries: Default is top 10 critical hosts. You can increase or reduce this number. l Bucket size in Seconds: Default is 600 (10 minutes) per bucket. You can increase or decrease the size depending on investigative needs. l Number of Buckets: The default is 36 buckets, which means a time range of 360 minutes or 6 hours. You can increase or decrease the number depending on investigative needs. Note: If you want to change the time range of the data monitor, adjust the bucket size or number of buckets, or both. To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This opens the data monitor's Edit panel. The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on "Top Value Counts Data Monitor" for details. Filter used by the data monitor Change the filter conditions to suit your business requirements. The filter is located in /All Filters/Downloads/Hostile Activity Detection/Reconnaissance/Critical Assets Scanned by External Sources. Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to filter conditions will affect the expected results in all resources using the filter. Refer to the User's Guide's topic on "Filtering Events" for details. Security Use Case Guide Chapter 7: Monitoring Scanned Hosts HPE ESM: Reconnaissance 1.0 Page 27 of 33
  • 28. Using the Top Internal Scanned Hosts Data Monitor This data monitor shows the internal scanned hosts sorted by traffic coming from external or internal scanners within the last 6 hours. It provides an overview of the most recent reconnaissance activity against the network. The data monitor shows the top 10 internal hosts that were scanned a maximum of 1000 times. Information is updated every 60 seconds. Following is a closeup of the data monitor: Security Use Case Guide Chapter 7: Monitoring Scanned Hosts HPE ESM: Reconnaissance 1.0 Page 28 of 33
  • 29. To view the Top Internal Scanned Hosts data monitor: l On the Reconnaissance use case's Dashboards section, click the link to the dashboard, Reconnaissance Monitoring. Or l On the Navigator > Resources panel: a. Go to /All Dashboard/Downloads/Hostile Activity Detection/Reconnaissance. b. Right-click Reconnaissance Monitoring and select Show Dashboard. The data monitor is located on the bottom right of the dashboard. Use this data monitor to investigate what scanners consider to be the top "most popular" hosts. To interpret the Top Internal Scanned Hosts data monitor: l Each vertical bar on the chart represents one internal scanned host, with the leftmost bar representing the host that received the most traffic. l By default, the data monitor displays the top 10 internal scanned hosts. The legend shows the total events per host with the highest number on top. The legend labeled "others" is a sum of events from the remaining scanned hosts not belonging to the top 10. Further investigations on the Top Internal Scanned Hosts data monitor: Use this data monitor to identify the applications installed in the internally scanned hosts. Are these applications critical to your operations? What is the impact if such hosts are attacked? l Double-click a chart element on the graph to open a channel about that element. Or right-click a chart element and choose Investigate, then choose an option to suit your investigative needs. Refer to the following topics in the ArcSight Console User's Guide : o The "Reference Guide" section for descriptions of the different categories displayed on the active channel o The "Investigating Views" topic for various ways to use the right-click Investigate option l Right-click on an event and select Export. Then select one of the available export options. Refer to the ArcSight Console User's Guide's topic, "Exporting Events to a File," for more information. To fine tune the Top Internal Scanned Hosts data monitor: ArcSight ESM provides filters to refine the data returned by the data monitor. The data monitor itself has default parameters that determine the time buckets. Caution: If making changes to any parameters, you must be familiar with factors that affect ESM performance resulting from these changes. You must also know how to edit ESM resources, such as modifying filter conditions and other attributes. Refer to the ArcSight Console User's Guide for Security Use Case Guide Chapter 7: Monitoring Scanned Hosts HPE ESM: Reconnaissance 1.0 Page 29 of 33
  • 30. details. Data monitor l # top entries: Default is 10 top internal scanned hosts. You can increase or reduce this number. l Bucket size in Seconds: Default is 600 seconds (10 minutes) per bucket. You can increase or decrease the size depending on investigative needs. l Number of Buckets: The default is 36 buckets, which means a time range of 360 minutes or 6 hours. You can increase or decrease the number depending on investigative needs. Note: If you want to change the time range of the data monitor, adjust the bucket size or number of buckets, or both. To edit the data monitor, click the pencil icon ( ) on the bottom toolbar of the data monitor. This opens the data monitor's Edit panel. The attributes of this data monitor type are described in the ArcSight Console User's Guide's topic on "Top Value Counts Data Monitor" for details. Filter used by the data monitor Change the filter conditions to suit your business requirements. The filter is located in /All Filters/Downloads/Hostile Activity Detection/Reconnaissance/Internal Scanned Hosts. Caution: Before modifying any filter, verify if this filter is being used by other resources. Changes to filter conditions will affect the expected results in all resources using the filter. Refer to the User's Guide's topic on "Filtering Events" for details. Security Use Case Guide Chapter 7: Monitoring Scanned Hosts HPE ESM: Reconnaissance 1.0 Page 30 of 33
  • 31. Chapter 8: Refining the Reconnaissance from Internal Sources Rule The Reconnaissance security use case includes multiple rules to set event fields with values relevant to tracking Reconnaissance activities. You are not required to modify these rules. You can, however, modify the rule called Reconnaissance from Internal Source in /All Rules/Downloads/Hostile Activity Detection/Reconnaissance. By default, this rule is designed to add information about the source (scanner) address, the source zone, and customer data to the Internal Scanners and Scanners List active lists. Additionally, the rule has the following default but disabled actions: l Create a case in /All Cases/Downloads/Hostile Activity Detection/Reconnaissance. with the following features: o The case name is Reconnaissance from Internal Source <source ip address> Detected o Include the base events related to the case. Note: If the case does not yet exist, the rule first creates the case with the dynamically- configured name then adds the base events to it. When the rule is triggered in the future, new base events are added to the case. l Send notification about the scan to the default destination, /All Destinations/SOC Operators/. o If you want to enable this rule with the default destination, make sure to configure it by adding users to the appropriate destination levels. o If you want to enable this rule action and you are not using the default destination SOC Operators, make sure you first define your own destination resource. Then specify your custom destination to the rule action. Refer to the "Managing Notification Destinations" in the ArcSight Console User's Guide. To customize rule actions: Tip: Refer to the ArcSight Console User's Guide's topic on "Rule Actions Reference" for details on the rule actions described here. 1. Log into the ArcSight Console with administrator privileges. 2. Go to /All Rules/Downloads/Hostile Activity Detection/Reconnaisance, right-click Reconnaissance from Internal Source, and choose Edit Rule. HPE ESM: Reconnaissance 1.0 Page 31 of 33
  • 32. 3. Click the disabled rule action, Add To Existing Case. a. On the Actions tab, right-click and choose Enable Action. b. If you want to further modify the rule action, right-click again and choose Edit. For example, change the URI if you have previously created a custom case group for reconnaissance tracking purposes. 4. Click the disabled rule action, Send Notification. a. Right-click and choose Enable Action. b. If you want to modify the rule action further, right-click again and choose Edit. For example, choose a different destination group and customize the notification message. Security Use Case Guide Chapter 8: Refining the Reconnaissance from Internal Sources Rule HPE ESM: Reconnaissance 1.0 Page 32 of 33
  • 33. Send Documentation Feedback If you have comments about this document, you can contact the documentation team by email. If an email client is configured on this system, click the link above and an email window opens with the following information in the subject line: Feedback on Security Use Case Guide (ESM: Reconnaissance 1.0) Just add your feedback to the email and click send. If no email client is available, copy the information above to a new message in a web mail client, and send your feedback to arc-doc@hpe.com. We appreciate your feedback! HPE ESM: Reconnaissance 1.0 Page 33 of 33