The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following
information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it
is not installed in accordance with NetScreen’s installation instructions, i t may cause interference wi th radio and tele vision reception. This equip ment has
been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These
specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation. If this equipmen t does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipme nt and receive r. Consult t he dealer o r an experienced ra dio/TV
technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warrant y and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET
THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
The Event Category Correlation Reference Guide provides you with information on
how to investigate various types of sec u rity threats using the Offense Manager,
Event Viewer , or Flow V iewer. You can sort offenses by category (such as, exploit,
policy, or malware).
ConventionsTable 1 lists conventions that are used throughout this guide.
Table 1 Icons
IconTypeDescription
Information noteInformation that describes important features or
instructions.
CautionInformation that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
WarningInformation that alerts you to potential personal
injury.
Technical
Documentation
Documentation
Feedback
You can access technical documentation, technical notes, and release notes
directly from the Juniper networks Support Web site at
www.juniper.net/support/.
http://
We encourage you to provide feedback, comments, and suggestions so that we
can improve the documentation. Send your comments to
techpubs-comments@juniper.net, orfill out the documentation feedback form at
http://www.juniper.net/techpubs/docbug/docbugreport.html. If you are using e-mail, be
sure to include the following information with your comments:
•Document name
•Document part number
•Page number
•Software release version
STRM Event Category Correlation Reference Guide
Page 6
2ABOUT THIS GUIDE
Requesting
Support
•Open a support case using the Case Management link at
http://www.juniper.net/support/ or call 1-888-314-JTAC (from the United States,
Canada, or Mexico) or 1-408-745-9500 (from elsewher e).
STRM Event Category Correlation Reference Guide
Page 7
EVENT CATEGORY CORRELATION
This document provides information on the types of event categories and the
processing of events. For example, the event category determines if events will
have an offense automatically created, real-time flow analysis, rate analysis, and
the default correlation tests performed. This document provides information on
event correlation including:
•About Event Category Correlation
•Recon
•DoS
•Authentication
•Access
•Exploit
•Malware
About Event
Category
Correlation
•Suspicious Activity
•System
•Policy
•CRE
•Potential Exploit
•SIM Audit
•VIS Host Discovery
•Application
An Event Processor processes events collected from one or more Event
Collector(s). Once received, the Event Processor correlates the information from
STRM and distributes to the appropriate Correlation Group for processing.
The Correlation Groups perform tests on the events to determine factors such as
vulnerability data, relevance of the targets, import ance, or credibility of the events.
The results of the Correlation Group tests appear as annotations in the Offense
Manager and Event Viewer. Also, custom rules are applied to additional events for
specific incident recognition. Once complete, the Event Processor stores the event
STRM Event Category Correlation Reference
Page 8
2EVENT CATEGORY CORRELATION
in the Ariel database and, in some circumstances, performs real-time flow analysis
to determine the appropriate routing of the event.
For example, Figure 2-1 provides a representation of the process within the Event
Processor for processing events. Once the Event Processor receives an event, the
Category Router determines the appropriate Correlation Group to apply tests to
the event. Once complete, the event is passed through the Custom Rules Engine
to determine the custom rules that apply to the event. The event is then passed
through the Ariel database for storage and the Flow Context and Routing
components to determine if real-time flow analysis should be performed and if the
event should automatically generate a new offense or become part of an existing
offense. If this is the case, the event is sent to the Magistrate. If real-time flow
analysis is requested of the event, a request is sent to the Classification Engine to
determine routing.
Events
Event Collector
Correlation
Group 1
Classification Engine
Correlation
Group 2
Events
Event Processor
Category Router
Correlation
Group 3
Custom Rules
Engine
Ariel DB Storage
Flow Context and Routing
Events
Correlation
Group 4
Event Collector
Correlation
Group 5
Magistrate
External Event
Exported to:
E-mail
Syslog
SNMP
Figure 2-1 Event Category Correlation Process
This section includes:
•High-Level Event Categories
•Event Correlation Processing
•Additional Event Processing
STRM Event Category Correlation Reference
Page 9
About Event Category Correlation3
High-Level Event
Categories
The high-level event categories include:
Table 2-1 High-Level Event Categories
CategoryDescription
ReconEvents relating to scanning a nd other techniqu es used to id entify
network resources, for example, network or host port scans.
DoSEvents relating to Denial of Service (DoS) or Distributed Denial of
Service (DDoS) attacks against services or hosts, for example,
brute force network DoS attacks.
AuthenticationEvents relating to authentication controls, group, or privilege
change, for example, log in or log out.
AccessEvents resulting from an attempt to access network resources,
for example, firewall accept or deny.
ExploitEvents relating to application exploits and buffer overflow
attempts, for example, buffer overflow or web application
exploits.
MalwareEvents relating to viruses, trojans, back door attacks, or other
forms of hostile software. This may include a virus, trojan,
malicious software, or spyware.
Suspicious
Activity
The nature of the threat is unknown but behavior is suspicious
including protocol anomalies that potentially indicate evasive
techniques, for example, packet fragmentation or known IDS
evasion techniques.
SystemEvents related to system changes, software installation, or status
messages.
PolicyEvents regarding corporate policy violations or misuse.
CREEvents generated from an offense or event rule. For more
information on creating custom rules, see the STRM Administration Guide.
Potential ExploitEvents relating to potential application exploits and buffer
overflow attempts.
SIM AuditEvents relating to user interaction with the Console and STRM
Administration Console.
VIS Host
Discovery
Events relating to the host, ports, or vulnerabilities that the VIS
component discovers.
ApplicationEvents relating to application activity.
STRM Event Category Correlation Reference
Page 10
4EVENT CATEGORY CORRELATION
Event Correlation
Processing
For each event category, the Correlation Group determines the correlation rules
(tests) that are performed on each event. Each test is performed and assigned a
value between 0 and 10. Once all tests are complete, all test results are weighted
and the data for the event is provided in the event viewer. Table 2-2 provides a list
of possible correlation rules (tests).
Table 2-2 Correlation Rules (Tests)
RuleDescription
Relevance of the
day of the week
Determines the relevance of the day of the week for this event.
For example, if the event occurs on the weekend, an attack may
have a higher relevance.
Device credibility Credibility rating can be applied on a per device basis that allows
users to associate a credibility to a device based on the level of
trust for the device and the validity of the produced event. For
example, a highly tuned IDS in front of a key server may have a
credibility of 7 while an IDS outside the corporate network may
have a credibility of 3.
Event rate Determines if the event rate of this event type is greater than
normal. This is determined on a category by category basis.
AttackerDetermines if the attacker is one of the configured assets.
TargetDetermines if the target is one of the configured assets.
Source portDetermines if the source port is less than 1024. If the port is less
than 1024, the attacker may be attempting to fool a stateless
firewall.
Attacker ageDetermines the relative importance of how long the attacker has
been known to the system. If the attacker is new, the relevance of
this attacker increases.
Target age Determines the relative importance of how long the target has
been known to the system.
Remote attackerDetermines the relative importance of the attacker network.
Remote targetDetermines the relative importance of the target network.
Target port Determines if the target port is included in the list of most
attacked ports provided by the incidents.org data.
Attacker riskDetermine the overall risk assessment value for the attacker
based on the asset profile data.
Target riskDetermine the overall risk assessment value for the target.
Time of the attack Determines the time of attack. For example, if the attack occurs
in the middle of the night, which is deemed to be a low traffic
time, this indicates a higher relevance of the attack .
Vulnerable
targeted port
If the port is open, determine if the targeted port is vulnerable to
the current exploit.
Vulnerable portDetermines if the port is vulnerable to any type of atta ck or
exploit.
Open target portDetermines if the target port is open.
STRM Event Category Correlation Reference
Page 11
About Event Category Correlation5
Table 2-2 Correlation Rules (Tests) (continued)
RuleDescription
Remote Target Determines if the target network is defined as a remote network
in STRM views.
Geographic
Location
Determines the relative importance of the geographic location of
the target.
Remote attackerDetermines if the attacker network is defined as a remote
network in STRM views.
Attacker IP
address
Determines if the attacker IP address is included in the list of IP
addresses that are highlighted as suspicious in the Remote
Services View.
Attacker portDetermines if the attacker port is included in the list of ports from
which attacks originate as provided by the incidents.org data.
Each low-level event category is processed by one of five event Correlation
Groups. This section provides information on the Correlation Groups including:
•Correlation Group 1
•Correlation Group 2
•Correlation Group 3
•Correlation Group 4
•Correlation Group 5
STRM Event Category Correlation Reference
Page 12
6EVENT CATEGORY CORRELATION
Correlation Group 1
The Correlation Group 1 correlation model provides tests for the following traffic
types:
Table 2-3 Correlation Group 1 Tests
Traffic TypeCorrelation Rules (Tests)
Local-to-LocalCorrelation Group 1 performs the following tests for
Local-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Target
• Source port
• Target port
• Cross host
• Attacker age
• Target age
• Attacker network
• Target network
• Vulnerable targeted port
• Attacker risk
• Target risk
• Time of the attack
• Open target port
• Vulnerable port
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Page 13
About Event Category Correlation7
Table 2-3 Correlation Group 1 Tests (continued)
Traffic TypeCorrelation Rules (Tests)
Local-to-RemoteCorrelation Group 1 performs the following tests for
Local-to-Remote traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Source port
• Target port
• Attacker age
• Attacker network
• Attacker risk
• Remote Target
• Geographic Location
• Time of the attack
Note: For test details, see
Table 2-2.
Remote-to-LocalCorrelation Group 1 performs the following tests for
Remote-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Target
• Source port
• Target age
• Attacker port
• Remote attacker
• Attacker IP address
• Geographic location
• Time of the attack
• Target network
• Target risk
• Open target port
• Vulnerable targeted port
• Vulnerable port
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Page 14
8EVENT CATEGORY CORRELATION
Correlation Group 2
The Correlation Group 2 correlation model provides tests for the following traffic
types:
Table 2-4 Correlation Group 2 Tests
Traffic TypeCorrelation Rules (Tests)
Local-to-LocalCorrelation Group 2 performs the following tests for
Local-to-RemoteCorrelation Group 2 performs the following tests for
Local-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Target
• Source port
• Attacker age
• Target age
• Attacker network
• Target port
• Attacker risk
• Target risk
• Time of the attack
• Open target port
Note: For test details, see
Table 2-2.
Local-to-Remote traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Source port
• Target port
• Attacker age
• Attacker network
• Attacker risk
• Remote target
• Target
• Geographic location
• Time of the attack
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Page 15
About Event Category Correlation9
Table 2-4 Correlation Group 2 Tests (continued)
Traffic TypeCorrelation Rules (Tests)
Remote-to-LocalCorrelation Group 2 performs the following tests for
Remote-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Target
• Source port
• Target age
• Attacker port
• Target port
• Remote Attacker
• Attacker IP address
• Geographic location
• Time of the attack
• Target network
• Target risk
• Open target port
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Page 16
10EVENT CATEGORY CORRELATION
Correlation Group 3
The Correlation Group 3 correlation model provides tests for the following traffic
types:
Table 2-5 Correlation Group 3 Tests
Traffic TypeCorrelation Rules (Tests)
Local-to-LocalCorrelation Group 3 performs the following tests for
Local-to-RemoteCorrelation Group 3 performs the following tests for
Local-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Target
• Source port
• Attacker age
• Target age
• Attacker network
• Target network
• Target port
• Attacker risk
• Target risk
• Time of the attack
Note: For test details, see
Table 2-2.
Local-to-Remote traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Source port
• Target port
• Attacker age
• Attacker network
• Attacker risk
• Geographic location
• Time of the attack
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Page 17
About Event Category Correlation11
Table 2-5 Correlation Group 3 Tests (continued)
Traffic TypeCorrelation Rules (Tests)
Remote-to-LocalCorrelation Group 3 performs the following tests for
Remote-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Target
• Source port
• Target age
• Attacker port
• Target port
• Attacker IP address
• Geographic location
• Time of the attack
• Target network
• Target risk
• Remote attacker
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Page 18
12EVENT CATEGORY CORRELATION
Correlation Group 4
The Correlation Group 4 correlation model provides tests for the following traffic
types:
Table 2-6 Correlation Group 4 Tests
Traffic TypeCorrelation Rules (Tests)
Local-to-LocalCorrelation Group 4 performs the following tests for
Local-to-RemoteCorrelation Group 4 performs the following tests for
Local-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Target
• Attacker age
• Target age
• Attacker network
• Target network
• Time of the attack
Note: For test details, see
Table 2-2.
Local-to-Remote traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Attacker age
• Attacker network
• Remote Target
• Geographic location
• Time of the attack
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Page 19
About Event Category Correlation13
Table 2-6 Correlation Group 4 Tests (continued)
Traffic TypeCorrelation Rules (Tests)
Remote-to-LocalCorrelation Group 4 performs the following tests for
Remote-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Target
• Target age
• Attacker port
• Remote attacker
• Geographic location
• Time of the attack
• Target network
• Vulnerable port
Note: For test details, see
Table 2-2.
Correlation Group 5
The Correlation Group 5 correlation model provides tests for the following traffic
types:
Table 2-7 Correlation Group 5 Tests
Traffic TypeCorrelation Rules (Tests)
Local-to-LocalCorrelation Group 5 performs the following tests for
Local-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Target
• Attacker network
• Target network
• Time of the attack
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Page 20
14EVENT CATEGORY CORRELATION
Table 2-7 Correlation Group 5 Tests (continued)
Traffic TypeCorrelation Rules (Tests)
Local-to-RemoteCorrelation Group 5 performs the following tests for
Remote-to-LocalCorrelation Group 5 performs the following tests for
Local-to-Remote traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker network
• Time of the attack
Note: For test details, see
Table 2-2.
Remote-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Target
• Target network
• Time of the attack
Note: For test details, see
Table 2-2.
Additional Event
Processing
Each event is processed using one of the following scenarios:
•Scenario 1 - Event information is forwarded to the Magistrate component by
automatically creating offenses. Even though offenses are created
automatically, no real-time flow analysis is performed. Events are stored in the
Event Processor.
•Scenario 2 - Events are stored in the Event Processor. Offenses are not
automatically created and no flow analysis is performed.
ReconThe Recon category indicates events relating to scanning and other techniques
used to identify network resources. The associated low-level event categories
include:
Table 2-8 Recon Categories
Low Level Event
Category
Unknown Form of
Recon
Description
Indicates an unknown form of
reconnaissance.
Application Query Indicates reconnaissance to
applications on your system.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
2Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
STRM Event Category Correlation Reference
Page 21
Table 2-8 Recon Categories (continued)
Recon15
Low Level Event
Category
Description
Host Query Indicates reconnaissance to a
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
3Correlation Group 2 Scenario 2
host in your network.
Network Sweep Indicates reconna issance on your
4Correlation Group 2 Scenario 2
network.
Mail
Reconnaissance
Windows
Reconnaissance
Portmap / RPC
Request
Host Port Scan Indicates a scan occurred on the
Indicates reconnaissance on your
mail system.
Indicates reconnaissance for
windows.
Indicates reconnaissance on your
portmap or RPC request.
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
host’s ports.
RPC Dump Indicates Remote Procedure Call
3Correlation Group 2 Scenario 2
(RPC) information is removed.
DNS
Reconnaissance
Misc
Reconnaissance
Indicates reconnaissance on the
DNS server.
Indicates a miscellaneous
reconnaissance event.
3Correlation Group 2 Scenario 2
2Correlation Group 2 Scenario 2
Event
Web
Reconnaissance
Database
Reconnaissance
ICMP
Reconnaissance
UDP
Reconnaissance
SNMP
Reconnaissance
Indicates web reconnaissance on
your network.
Indicates database
reconnaissance on your network.
Indicates reconnaissance on
ICMP traffic.
Indicates reconnaissance on
UDP traffic.
Indicates reconnaissance on
SNMP traffic.
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
ICMP Host QueryIndicates an ICMP host query. 3Correlation Group 2 Scenario 2
UDP Host QueryIndicates a UDP host query. 3Correlation Group 2 Scenario 2
NMAP
Indicates NMAP reconnaissance. 3Correlation Group 2 Scenario 2
Reconnaissance
TCP
Reconnaissance
Unix
Reconnaissance
FTP
Indicates TCP reconnaissance on
3Correlation Group 2 Scenario 2
your network.
Indicates reconnaissance on your
3Correlation Group 2 Scenario 2
UNIX network.
Indicates FTP reconnaissance. 3Correlation Group 2 Scenario 2
Reconnaissance
STRM Event Category Correlation Reference
Page 22
16EVENT CATEGORY CORRELATION
DoSThe DoS category indicates events relating to Denial Of Service (DoS) attacks
against services or hosts. The associated low-level event categories include:
Table 2-9 DoS Categories
Low Level Event
Category
Unknown DoS
Description
Indicates an unknown DoS attack. 8Correlation Group 2 Scenario 2
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
Attack
ICMP DoS Indicates an ICMP DoS attack. 9Correlation Group 2 Scenario 2
TCP DoSIndicates a TCP DoS attack. 9Correlation Group 2 Scenario 2
UDP DoSIndicates a UDP DoS attack. 9Correlation Group 2 Scenario 2
DNS Service DoSIndicates a DNS service DoS
8Correlation Group 2 Scenario 2
attack.
Web Service DoSIndicates a web service DoS
8Correlation Group 2 Scenario 2
attack.
Mail Service DoSIndicates a mail server DoS attack. 8Correlation Group 2 Scenario 2
Distributed DoSIndicates a distributed DoS attack. 9Correlation Group 2 Scenario 2
Misc DoSIndicates a miscellaneous DoS
8Correlation Group 2 Scenario 2
attack.
Unix DoSIndicates a Unix DoS attack. 8Correlation Group 2 Scenario 2
Windows DoSIndicates a Windows DoS attack. 8Correlation Group 2 Scenario 2
Database DoSIndicates a database DoS attack. 8Correlation Group 2 Scenario 2
FTP DoSIndicates an FTP DoS attack. 8Correlation Group 2 Scenario 2
Infrastructure DoSIndicates a DoS attack on the
8Correlation Group 2 Scenario 2
infrastructure.
Telnet DoSIndicates a Telnet DoS attack. 8Correlation Group 2 Scenario 2
Brute Force LoginIndicates access to your system
8Correlation Group 2 Scenario 2
through unauthorized methods.
High Rate TCP
DoS
High Rate UDP
DoS
High Rate ICMP
DoS
Indicates a high rate TCP DoS
attack.
Indicates a high rate UDP DoS
attack.
Indicates a high rate ICMP DoS
attack.
8Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
High Rate DoSIndicates a high rate DoS attack. 8Correlation Group 2 Scenario 2
Medium Rate TCP
DoS
Medium Rate UDP
DoS
Medium Rate
ICMP DoS
Indicates a medium rate TCP
attack.
Indicates a medium rate UDP
attack.
Indicates a medium rate ICMP
attack.
8Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
STRM Event Category Correlation Reference
Page 23
Table 2-9 DoS Categories (continued)
DoS17
Low Level Event
Category
Description
Medium Rate DoS Indicates a medium rate DoS
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
8Correlation Group 2 Scenario 2
attack.
Medium Rate DoS Indicates a medium rate DoS
8Correlation Group 2 Scenario 2
attack.
Low Rate TCP
DoS
Low Rate UDP
DoS
Low Rate ICMP
DoS
Indicates a low rate TCP DoS
attack.
Indicates a low rate UDP DoS
attack.
Indicates a low rate ICMP DoS
attack.
8Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
Low Rate DoSIndicates a low rate DoS attack. 8Correlation Group 2 Scenar io 2
Distributed High
Rate TCP DoS
Distributed High
Rate UDP DoS
Distributed High
Rate ICMP DoS
Distributed High
Rate DoS
Distributed Medium
Rate TCP DoS
Distributed Medium
Rate UDP DoS
Distributed Medium
Rate ICMP DoS
Distributed Medium
Rate DoS
Distributed Low
Rate TCP DoS
Distributed Low
Rate UDP DoS
Distributed Low
Rate ICMP DoS
Distributed Low
Rate DoS
High Rate TCP
Indicates a distributed high rate
8Correlation Group 2 Scenario 2
TCP DoS attack.
Indicates a distributed high rate
8Correlation Group 2 Scenario 2
UDP DoS attack.
Indicates a distributed high rate
8Correlation Group 2 Scenario 2
ICMP DoS attack.
Indicates a distributed high rate
8Correlation Group 2 Scenario 2
DoS attack.
Indicates a distributed medium
8Correlation Group 2 Scenario 2
rate TCP DoS attack.
Indicates a distributed medium
8Correlation Group 2 Scenario 2
rate UDP DoS attack.
Indicates a distributed medium
8Correlation Group 2 Scenario 2
rate ICMP DoS attack.
Indicates a distributed medium
8Correlation Group 2 Scenario 2
rate DoS attack.
Indicates a distributed low rate
8Correlation Group 2 Scenario 2
TCP DoS attack.
Indicates a distributed low rate
8Correlation Group 2 Scenario 2
UDP DoS attack.
Indicates a distributed low rate
8Correlation Group 2 Scenario 2
ICMP DoS attack.
Indicates a distributed low rate
8Correlation Group 2 Scenario 2
DoS attack.
Indicates a high rate TCP scan. 8Correlatio n Gr ou p 2 Scenario 2
Scan
High Rate UDP
Indicates a high rate UDP scan. 8Correlation Group 2 Scenario 2
Scan
High Rate ICMP
Indicates a high rate ICMP scan. 8Correlation Group 2 Scenario 2
Scan
STRM Event Category Correlation Reference
Page 24
18EVENT CATEGORY CORRELATION
Table 2-9 DoS Categories (continued)
Low Level Event
Category
Description
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
High Rate ScanIndicates a high rate scan. 8Correlation Group 2 Scenario 2
Medium Rate TCP
Scan
Medium Rate UDP
Scan
Medium Rate
ICMP Scan
Indicates a medium rate TCP
scan.
Indicates a medium rate UDP
scan.
Indicates a medium rate ICMP
scan.
8Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
Medium Rate Scan Indicates a medium rate scan. 8Correlation Group 2 Scenario 2
Low Rate TCP
Indicates a low rate TCP scan. 8Correlation Group 2 Scenario 2
Scan
Low Rate UDP
Indicates a low rate UDP scan. 8Correlation Group 2 Scenario 2
Scan
Low Rate ICMP
Indicates a low rate ICMP scan. 8Correlation Group 2 Scenario 2
Scan
Low Rate ScanIndicates a low rate scan. 8Correlation Group 2 Scenario 2
VoIP DoSIndicates a VoIP DoS attack8Correlation Group 2 Scenario 2
AuthenticationThe authentication category indicates events relating to authentication and access
controls. The associated low-level event categories include:
Table 2-10 Authentication Categories
Low Level Event
Category
Unknown
Description
Indicates unknown authentication 1Correlation Group 3 Scenario 2
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
Authentication
Host Login
Succeeded
Indicates the host login was
successful.
1Correlation Group 3 Scenario 2
Host Login FailedIndicates the host login failed. 3Correlation Group 3 Scenario 2
Misc Login
Succeeded
Misc Login FailedIndicates that login sequence
Indicates that the login sequence
succeeded.
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
failed.
Privilege
Escalation Failed
Privilege
Escalation
Indicates that the privileged
escalation failed.
Indicates that the privilege
escalation succeeded.
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
Succeeded
Mail Service Login
Succeeded
Indicates that the mail service
login succeeded.
1Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 25
Table 2-10 Authentication Categories (continued)
Authentication19
Low Level Event
Category
Mail Service Login
Failed
Auth Server Login
Failed
Auth Server Login
Succeeded
Web Service Login
Succeeded
Web Service Login
Failed
Admin Login
Successful
Admin Login
Failure
Suspicious
Username
Description
Indicates that the mail service
login failed.
Indicates that the authentication
server login failed.
Indicates that the authentication
server login succeeded.
Indicates that the web service
login succeeded.
Indicates that the web service
login failed.
Indicates the administrative login
was successful.
Indicates the administrative login
failed.
Indicates that a user attempted to
access the network using an
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
incorrect username.
Login with
username/
password defaults
Indicates that a user accessed the
network using the default
username and password.
4Correlation Group 3 Scenario 2
successful
Login with
username/
password defaults
failed
FTP Login
Succeeded
Indicates that a user was
unsuccessful accessing the
network using the default
username and password.
Indicates that the FTP login was
successful.
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
FTP Login FailedIndicates that the FTP logi n failed. 3Correlation Group 3 Scenario 2
SSH Login
Succeeded
Indicates that the SSH login was
successful.
1Correlation Group 3 Scenario 2
SSH Login FailedIndicates that the SSH login failed. 2Correlation Group 3 Scenario 2
User Right
Assigned
Indicates that user access to
network resources was
1Correlation Group 3 Scenario 2
successfully granted.
User Right
Removed
Indicates that user access to
network resources was
1Correlation Group 3 Scenario 2
successfully removed.
Trusted Domain
Added
Indicates that a trusted domain
was successfully added to your
1Correlation Group 3 Scenario 2
deployment.
Trusted Domain
Removed
Indicates that a trusted domain
was removed from your
1Correlation Group 3 Scenario 2
deployment.
STRM Event Category Correlation Reference
Page 26
20EVENT CATEGORY CORRELATION
Table 2-10 Authentication Categories (continued)
Low Level Event
Category
System Security
Access Granted
System Security
Access Removed
Description
Indicates that system security
access was successfully granted.
Indicates that system security
access was successfully removed.
Policy AddedIndicates that a policy was
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
successfully added.
Policy ChangeIndicates that a policy was
1Correlation Group 3 Scenario 2
successfully changed.
User Account
Added
User Account
Changed
Password Change
Failed
Indicates that a user account was
successfully added.
Indicates a change to an existing
user account.
Indicates that an attempt to
change an existing password
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
failed.
Password Change
Succeeded
User Account
Removed
Group Member
Added
Group Member
Removed
Group AddedIndicates that a group was
Indicates that a password change
was successful.
Indicates that a user account was
successfully removed.
Indicates that a group member
was successfully added.
Indicates that a group member
was removed.
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
successfully added.
Group ChangedIndicates a change to an existing
1Correlation Group 3 Scenario 2
group.
Group RemovedIndicates a group was re mo ved. 1Correlation Group 3 Scenario 2
Computer Account
Added
Computer Account
Changed
Computer Account
Removed
Remote Access
Login Succeeded
Indicates a computer account has
been successfully added.
Indicates a change to an existing
computer account.
Indicates a computer account has
been successfully removed.
Indicates that access to the
network using a remote login was
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
successful.
Remote Access
Login Failed
Indicates that an attempt to
access the network using a
3Correlation Group 3 Scenario 2
remote login failed.
STRM Event Category Correlation Reference
Page 27
Table 2-10 Authentication Categories (continued)
Authentication21
Low Level Event
Category
General
Authentication
Description
Indicates that the authentication
processes was successful
Successful
General
Authentication
Indicates that the authenticating
process failed.
Failed
Telnet Login
Succeeded
Indicates that the telnet login was
successful.
Telnet Login Failed Indicates that the telnet login
failed.
Suspicious
Password
Indicates that a user attempted to
login using a suspicious
password.
Samba Login
Successful
Samba Login
Failed
Auth Server
Session Opened
Indicates a user successfully
logged in using Samba.
Indicates user login failed using
Samba.
Indicates that a communication
session with the authentication
server was started.
Auth Server
Session Closed
Indicates that a communication
session with the authentication
server was closed.
Firewall Session
Closed
Indicates that a firewall session
was closed.
Host LogoutIndicates that a host successfully
logged out.
Misc LogoutIndicates that a user successfully
logged out.
Auth Server
Logout
Indicates that the process to log
out of the authentication server
was successful.
Web Service
Logout
Indicates that the process to log
out of the web service was
successful.
Admin LogoutIndicates that the administrative
user successfully logged out.
FTP LogoutIndicates that the process to log
out of the FTP service was
successful.
SSH LogoutIndicates that the process to log
out of the SSH session was
successful.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 28
22EVENT CATEGORY CORRELATION
Table 2-10 Authentication Categories (continued)
Low Level Event
Category
Remote Access
Logout
Description
Indicates that the process to log
out using remote access was
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 3 Scenario 2
successful.
Telnet LogoutIndicates that the process to log
1Correlation Group 3 Scenario 2
out of the Telnet session was
successful.
Samba LogoutIndicates that the process to log
1Correlation Group 3 Scenario 2
out of Samba was successful.
SSH Session
Started
Indicates that the SSH login
session has been initiated on a
1Correlation Group 5 Scenario 2
host.
SSH Session
Finished
Admin Session
Started
Indicates the termination of an
SSH login session on a host.
Indicates that a login session has
been initiated on a host by an
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
administrative or privileged user.
Admin Session
Finished
Indicates the termination of an
administrator or privileged users
1Correlation Group 5 Scenario 2
login session on a host.
VoIP Login
Succeeded
VoIP Login FailedIndicates an unsuccessful attempt
Indicates a successful VoIP
service login
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
to access VoIP service.
VoIP LogoutIndicates a user logout,1Correlation Group 3 Scenario 2
VoIP Session
Initiated
VoIP Session
Terminated
Database Login
Succeeded
Database Login
Failure
Indicates the beginning of a VoIP
session.
Indicates the end of a VoIP
session.
Indicates a successful database
login.
Indicates that a database login
attempt failed.
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 29
Access23
AccessThe access category indicates events relating to authentication and access
controls. The associated low-level event categories include:
Table 2-11 Access Categories
Low Level Event
Category
Unknown Network
Communication
Description
Indicates an unknown network
communication event.
Event
Firewall PermitIndicates access to the firewall
was permitted.
Firewall DenyIndicates access to the firewall
was denied.
Flow Context
Response
Indicates events from the
Classification Engine in response
to a SIM request.
Misc Network
Communication
Indicates a miscellaneous
communications event.
Event
IPS DenyIndicates Intrusion Prevention
Systems (IPS) denied traffic.
Firewall Session
Opened
Firewall Session
Closed
Dynamic Address
Translation
Indicates the firewall session has
been opened.
Indicates the firewall session has
been closed.
Indicates that dynamic address
translation was successful.
Successful
No Translation
Group Found
Indicates that no translation
group has been found.
Misc AuthorizationIndicates that access was
granted to a miscellaneous
authentication server.
ACL PermitIndicates that an ACL was
permitted access.
ACL DenyIndicates that an ACL was
denied access.
Access PermittedIndicates that access was
permitted.
Access DeniedIndicates that access was
denied.
Session OpenedIndicates that a session was
opened
Session ClosedIndicates that a session was
closed.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
3Correlation Group 3 Scenario 2
0Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
5No event
Scenario 2
pass-through
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
0Correlation Group 3 Scenario 2
0Correlation Group 3 Scenario 2
0Correlation Group 3 Scenario 2
2Correlation Group 3 Scenario 2
2Correlation Group 3 Scenario 2
0Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
0Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 30
24EVENT CATEGORY CORRELATION
Table 2-11 Access Categories (continued)
Low Level Event
Category
Description
Session ResetIndicates that a session was
reset.
Session Terminated In dicates that a session was
terminated.
Session DeniedIndicates that a session was
denied.
Session in Progress Indicates that a session is
currently in progress.
Session DelayedIndicates that a session was
delayed.
Session QueuedIndicates that a session was
queued.
Session InboundIndicates that a session is
inbound.
Session OutboundIndicates that a session is
outbound.
Unauthorized
Access Attempt
Indicates that an unauthorized
access attempt was detected.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
ExploitThe exploit category indicates events where a communication or access has
occurred. The associated low-level event categories include:
Table 2-12 Exploit Categories
Low Level Event
Category
Unknown Exploit
Attack
Description
Indicates an unknown exploit
attack.
Buffer OverflowIndicates a buffer overflow. 9Correlation Group 1 Scenario 2
DNS ExploitIndicates a DNS exploit. 9Correlation Group 1 Scenario 2
Telnet ExploitIndicates a Telnet exploit. 9Correlation Group 1 Scenario 2
Linux ExploitIndicates a Linux exploit. 9Correlation Group 1 Scenario 2
Unix ExploitIndicates a Unix exploit. 9Correlation Group 1 Scenario 2
Windows ExploitIndicates a Windows exploit.9Correlation Group 1 Scenario 2
Mail ExploitIndicates a mail server exploit. 9Correlation Group 1 Scenario 2
Infrastructure
Exploit
Indicates an infrastructure
exploit.
Misc ExploitIndicates a miscellaneous
exploit.
Web ExploitIndic at es a web exp lo i t. 9Correlation Group 1 Scenario 2
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
9Correlation Group 1 Scenario 2
9Correlation Group 1 Scenario 2
9Correlation Group 1 Scenario 2
STRM Event Category Correlation Reference
Page 31
Table 2-12 Exploit Categories (continued)
Malware25
Low Level Event
Category
Description
Session HijackIndicates a session in your
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
9Cor re l at io n Gr ou p 2 Scenar io 2
network has been interceded.
Worm ActiveIndicates an active worm. 10Correlation Group 1 Scenario 2
Password
Guess/Retrieve
Indicates that a user has
requested access to their
9Cor re l at io n Gr ou p 2 Scenar io 2
password information from the
database.
FTP ExploitIndicates an FTP exploit. 9Correlation Gr ou p 1 Scen ar io 2
RPC ExploitIndicates an RPC exploit. 9Correlation Group 1 Scenario 2
SNMP ExploitIndicates an SNMP exploit.9Correlation Gr ou p 1 Scen ar io 2
NOOP ExploitIndicates an NOOP exploit.9Correlation Group 1 Scenar io 2
Samba ExploitIndicates an Samba exploit.9Correlation Group 1 Scenario 2
Database ExploitIndicates a database exploit.9Correlation Group 1 Scenario 2
SSH ExploitIndicates an SSH exploit.9Correlation Group 1 Scenario 2
ICMP ExploitIndicates an ICMP exploit.9Correlation Group 1 Scenario 2
UDP ExploitIndicates a UDP exploit.9Correlation Grou p 1 Scen ar io 2
Browser ExploitIndicates an exploit on your
9Cor re l at io n Gr ou p 1 Scenar io 2
browser.
DHCP ExploitIndicates a DHCP exploit9Correlation Group 1 Scenario 2
Remote Access
Exploit
ActiveX Exploit Indicates an exploit through an
Indicates a remote access
exploit
9Cor re l at io n Gr ou p 1 Scenar io 2
9Cor re l at io n Gr ou p 1 Scenar io 2
ActiveX application.
SQL InjectionIndicates that an SQL injection
9Cor re l at io n Gr ou p 1 Scenar io 2
has occurred.
MalwareThe malicious software (malware) category indicates events relating to application
exploits and buffer overflow attempts. The associated low-level event categories
include:
Table 2-13 Malware Categories
Low Level Event
Category
Unknown Malware Indicates an unknown virus. 4Correlation Group 2 Scenario 2
Backdoor Detected Indicates that a backdoor to the
Hostile Mail
Attachment
Malicious Software Indicates a virus. 6Correlation Group 2 Scenario 2
Description
system has been detected.
Indicates a hostile mail
attachment.
Severity Level
(0 to 10)
Event Correlation/
Processing
9Correlation Group 2 Scenario 2
6Correlation Group 2 Scenario 2
STRM Event Category Correlation Reference
Additional Event
Processing
Page 32
26EVENT CATEGORY CORRELATION
Table 2-13 Malware Categories (continued)
Low Level Event
Category
Hostile Software
Download
Description
Indicates a hostile software
download to your network.
Virus DetectedIndicates a virus has been
detected.
Misc MalwareIndicates miscellaneous
malicious software
Trojan DetectedIndicates a trojan has been
detected.
Spyware DetectedIndicates spyware has been
detected on your system.
Content ScanIndicates that an attempted scan
of your content has been
detected.
Content Scan
Failed
Content Scan
Successful
Content Scan in
Progress
Indicates that a scan of your
content has failed.
Indicates that a scan of your
content was successful.
Indicates that a scan of your
content is currently in progress.
KeyloggerIndicates that a key logger has
been detected.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
6Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
7Correlation Group 2 Scenario 2
6Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
7Correlation Group 2 Scenario 2
Suspicious ActivityThe suspicious activity category indicates events relating to viruses, trojans, back
door attacks, and other forms of hostile software. The associated low-level event
categories include:
Table 2-14 Suspicious Categories
Low Level Event
Category
Unknown
Suspicious Event
Suspicious Pattern
Detected
Content Modified By
Firewall
Invalid Command or
Data
Description
Indicates an unknown suspicious
event.
Indicates a suspicious pattern
has been detected.
Indicates that content has been
modified by the firewall.
Indicates an invalid command or
data.
Suspicious Packet Indicates a suspicious packet. 3Correlation Group 2 Scenario 2
Suspicious Activity Indicates suspicious activity. 3Correlation Group 2 Scenario 2
STRM Event Category Correlation Reference
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
Page 33
Table 2-14 Suspicious Categories (continued)
Suspicious Activity27
Low Level Event
Category
Suspicious File
Description
Indicates a suspicious file name. 3Correlation Group 2 Scenario 2
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
Name
Suspicious Port
Indicates suspicious port activity. 3Correlation Group 2 Scenario 2
Activity
Suspicious Routing Indicates suspicious routing. 3Correlation Group 2 Scenario 2
Potential Web
Vulnerability
Unknown Evasion
Event
Indicates potential web
vulnerability.
Indicates an unknown evasion
event.
3Correlation Group 2 Scenario 2
5Correlation Group 2 Scenario 2
IP Spoof Indicates an IP spoof. 5Correlation Group 2 Scenario 2
IP Fragmentation Indicates IP fragmentation. 3Correlation Group 2 Scenario 2
Overlapping IP
Fragments
Indicates overlapping IP
fragments.
5Correlation Group 2 Scenario 2
IDS Evasion Indicates an IDS evasion. 5Correlation Group 2 Scenario 2
DNS Protocol
Anomaly
FTP Protocol
Anomaly
Mail Protocol
Anomaly
Routing Protocol
Anomaly
Web Protocol
Anomaly
SQL Protocol
Anomaly
Executable Code
Detected
Misc Suspicious
Event
Indicates a DNS protocol
anomaly.
Indicates an FTP protocol
anomaly.
Indicates a mail protocol
anomaly.
Indicates a routing protocol
anomaly.
Indicates a web protocol
anomaly.
Indicates an SQL protocol
anomaly.
Indicates that an executable code
has been detected.
Indicates a miscellaneous
suspicious event.
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
5Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
Information LeakIndicates an information leak. 1Correlation Group 2 Scenario 2
Potential Mail
Vulnerability
Potential Version
Vulnerability
Potential FTP
Vulnerability
Potential SSH
Vulnerability
Potential DNS
Vulnerability
Indicates a potential vulnerability
in the mail server.
Indicates a potential vulnerability
in the STRM version.
Indicates a potential FTP
vulnerability.
Indicates a potential SSH
vulnerability.
Indicates a potential vulnerability
in the DNS server.
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
STRM Event Category Correlation Reference
Page 34
28EVENT CATEGORY CORRELATION
Table 2-14 Suspicious Categories (continued)
Low Level Event
Category
Potential SMB
Vulnerability
Potential Database
Vulnerability
IP Protocol
Anomaly
Suspicious IP
Address
Invalid IP Protocol
Usage
Description
Indicates a potential SMB
(Samba) vulnerability.
Indicates a potential vulnerability
in the database.
Indicates a potential IP protocol
anomaly
Indicates a suspicious IP address
has been detected.
Indicates an invalid IP protocol
misuse.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
3Correlation Group 2 Scenario 2
2Correlation Group 2 Scenario 2
2Correlation Group 2 Scenario 2
Invalid ProtocolIndicates an invalid protocol. 4Correlation Group 2 Scenario 2
Suspicious Window
Events
Suspicious ICMP
Activity
Potential NFS
Vulnerability
Potential NNTP
Vulnerability
Indicates a suspicious event with
a screen on your desktop.
Indicates suspicious ICMP
activity.
Indicates a potential Network File
System (NFS) vulnerability.
Indicates a potential Network
News Transfer Protocol (NNTP)
2Correlation Group 2 Scenario 2
2Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
vulnerability.
Potential RPC
Vulnerability
Potential Telnet
Vulnerability
Potential SNMP
Vulnerability
Illegal TCP Flag
Combination
Suspicious TCP
Flag Combination
Indicates a potential RPC
vulnerability.
Indicates a potential Telnet
vulnerability on your system.
Indicates a potential SNMP
vulnerability.
Indicates an invalid TCP flag
combination has been detected.
Indicates a potentially invalid
TCP flag combination has been
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
5Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
detected.
Illegal ICMP
Protocol Usage
Indicates an invalid use of the
ICMP protocol has been
5Correlation Group 2 Scenario 2
detected.
Suspicious ICMP
Protocol Usage
Indicates a potentially invalid use
of the ICMP protocol has been
4Correlation Group 2 Scenario 2
detected.
Illegal ICMP TypeIndicates an invalid ICMP type
5Correlation Group 2 Scenario 2
has been detected.
Illegal ICMP CodeIndicates an invalid ICMP code
5Correlation Group 2 Scenario 2
has been detected.
STRM Event Category Correlation Reference
Page 35
Table 2-14 Suspicious Categories (continued)
Suspicious Activity29
Low Level Event
Category
Suspicious ICMP
Type
Suspicious ICMP
Code
Description
Indicates a potentially invalid
ICMP type has been detected.
Indicates a potentially invalid
ICMP code has been detected.
TCP port 0Indicates a TCP packet using a
reserved port (0) for source or
destination.
UDP port 0Indicates a UDP packets using a
reserved port (0) for source or
destination.
Hostile IPIndicates the use of a known
hostile IP address.
Watch list IPIndicates the use of an IP
address from a watch list of IP
addresses.
Known offender IPIndicates the use of an IP
address of a known offender.
RFC 1918 (private) IPIndicates the use of an IP
address from a private IP address
range.
Potential VoIP
Vulnerability
Indicates a potential VoIP
vulnerability.
Blacklist AddressIndicates that an IP address is on
the black list.
Watchlist AddressIndicates that the IP address is
on the list of IP addresses being
monitored.
Darknet AddressIndicates that the IP address is
part of a darknet.
Botnet AddressIndicates that the address is part
of a botnet.
Suspicious Address Indicates that the IP address
should be monitored.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
4Correlation Group 2 Scenario 2
8Correlation Group 2 Scenario 2
7Correlation Group 2 Scenario 2
5Correlation Group 2 Scenario 2
7Correlation Group 2 Scenario 2
5Correlation Group 2 Scenario 2
STRM Event Category Correlation Reference
Page 36
30EVENT CATEGORY CORRELATION
SystemThe system category indicates that the nature of threat is unknown but the
behavior is suspicious including protocol anomalies potentially indicating evasive
techniques. The associated low-level event categories include:
Table 2-15 System Categories
Low Level Event
Category
Unknown System
Event
Description
Indicates an unknown system
event.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 5 Scenario 2
System Boot Indicates a system boot. 1Correlation Group 5 Scenario 2
System
Configuration
System Halt Indicates the system has been
Indicates a change in the
system configuration.
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
halted.
System Failure Indicates a system failure. 6Correlation Group 5 Scenario 2
System Status Indicates any informatio n eve nt . 1Correlation Group 5 Scenario 2
System ErrorIndicates a system error.3Correlation Group 5 Scenario 2
Misc System EventIndicates a miscellaneous
1Correlation Group 5 Scenario 2
system event.
Service StartedIndicates system services have
1Correlation Group 5 Scenario 2
started.
Service StoppedIndicates system services have
1Correlation Group 5 Scenario 2
stopped.
Service FailureIndicates a system failure. 6Correlation Group 5 Scenario 2
Successful Registry
Modification
Indicates that a modification to
the registry has been
1Correlation Group 5 Scenario 2
successful.
Successful
Host-Policy
Modification
Successful File
Modification
Successful Stack
Modification
Successful
Application
Modification
Successful
Configuration
Modification
Successful Service
Modification
Failed Registry
Modification
Indicates that a modification to
the host policy has been
successful.
Indicates that a modification to a
file has been successful.
Indicates that a modification to
the stack has been successful.
Indicates that a modification to
the application has been
successful.
Indicates that a modification to
the configuration has been
successful.
Indicates that a modification to a
service has been successful.
Indicates that a modification to
the registry has failed.
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
STRM Event Category Correlation Reference
Page 37
Table 2-15 System Categories (continued)
System31
Low Level Event
Category
Failed Host-Policy
Modification
Failed File
Modification
Failed Stack
Modification
Failed Application
Modification
Failed Configuration
Modification
Failed Service
Modification
Description
Indicates that a modification to
the host policy has failed.
Indicates that a modification to a
file has failed.
Indicates that a modification to
the stack has failed.
Indicates that a modification to
an application has failed.
Indicates that a modification to
the configuration has failed.
Indicates that a modification to
the service has failed.
Registry AdditionIndicates that an new item has
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
been added to the registry.
Host-Policy CreatedIndicates that a new entry has
1Correlation Group 5 Scenario 2
been added to the registry.
File CreatedIndicates that a new has been
1Correlation Group 5 Scenario 2
created in the system.
Application InstalledIndicates that a new application
1Correlation Group 5 Scenario 2
has been installed on the
system.
Service InstalledIndicates that a new service has
1Correlation Group 5 Scenario 2
been installed on the system.
Registry DeletionIndicates that a registry entry
1Correlation Group 5 Scenario 2
has been deleted.
Host-Policy DeletedIndicates that a host policy entry
1Correlation Group 5 Scenario 2
has been deleted.
File DeletedIndicates that a file has been
1Correlation Group 5 Scenario 2
deleted.
Application
Uninstalled
Service UninstalledIndicates that a service has
Indicates that an application has
been uninstalled.
1Correlation Group 5 Scenario 2
1Correlation Group 5 Scenario 2
been uninstalled.
System Informational Indicates system information. 3Correlation Group 5 Sc en ar io 2
System Action AllowIndicates that an attempted
3Correlation Group 5 Scenario 2
action on the system has been
authorized.
System Action DenyIndicates that an attempted
4Correlation Group 5 Scenario 2
action on the system has been
denied.
CronIndicates a crontab message.1Correlation Group 5 Scen ar io 2
STRM Event Category Correlation Reference
Page 38
32EVENT CATEGORY CORRELATION
Table 2-15 System Categories (continued)
Low Level Event
Category
Description
Cron StatusIndicates a crontab status
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 5 Scenario 2
message.
Cron FailedIndicates a crontab failure
4Correlation Group 5 Scenario 2
message.
Cron SuccessfulIndicates a crontab success
1Correlation Group 5 Scenario 2
message.
DaemonIndicates a daemon message.1Correlation Group 5 Scenario 2
Daemon StatusIndicates a daemon status
1Correlation Group 5 Scenario 2
message.
Daemon FailedIndicates a daemon failure
4Correlation Group 5 Scenario 2
message.
Daemon SuccessfulIndicates a daemon success
1Correlation Group 5 Scenario 2
message.
KernelIndicates a kernel message.1Correlation Group 5 Scenario 2
Kernel StatusIndicates a kernel status
1Correlation Group 5 Scenario 2
message.
Kernel FailedIndicates a kernel failure
Correlation Group 5 Scenario 2
message.
Kernel SuccessfulIndicates a kernel successful
1Correlation Group 5 Scenario 2
message.
AuthenticationIndicates an authentication
1Correlation Group 5 Scenario 2
message.
InformationIndicates an informational
2Correlation Group 5 Scenario 2
message.
NoticeIndicates a notice message. 3Correlation Group 5 Scenario 2
WarningIndicates a warning message. 5Correlation Group 5 Scenario 2
ErrorIndicates an error message. 7Correlation Group 5 Scenario 2
CriticalIndicates a critical message. 9Correlation Group 5 Scenario 2
DebugIndicates a debug message. 1Correlation Group 5 Scenario 2
MessagesIndicates a generic message. 1Correlation Group 5 Scenario 2
Privilege AccessIndicates that privilege access
3Correlation Group 5 Scenario 2
was attempted.
STRM Event Category Correlation Reference
Page 39
Policy33
PolicyThe policy category indicates events relating to system changes, software
installation, or status messages. The associated low-level event categories
include:
Table 2-16 Policy Categories
Low Level Event
Category
Unknown Policy
Violation
Description
Indicates an unknown policy
violation.
Web Policy ViolationIndicates a web policy
violation.
Remote Access
Policy Violation
IRC/IM Policy
Violation
Indicates a remote access
policy violation.
Indicates an instant
messenger policy violation.
P2P Policy ViolationIndicates a Peer-to-Peer (P2P)
policy violation.
IP Access Policy
Violation
Application Policy
Violation
Database Policy
Violation
Network Threshold
Policy Violation
Indicates an IP access policy
violation.
Indicates an application policy
violation.
Indicates a database policy
violation.
Indicates a network threshold
policy violation.
Porn Policy ViolationIndicates a porn policy
violation.
Games Policy
Violation
Indicates a games policy
violation.
Misc Policy ViolationIndicates a miscellaneous
policy violation.
Compliance Policy
Violation
Indicates a compliance policy
violation.
Mail Policy ViolationIndicates a mail policy
violation.
IRC Policy ViolationIndicates an IRC policy
violation
IM Policy ViolationIndicates a policy violation
related to instant messaging
(IM) activities.
VoIP Policy ViolationIndicates a VoIP policy
violation
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
2Correlation Group 4 Scenario 2
STRM Event Category Correlation Reference
Page 40
34EVENT CATEGORY CORRELATION
CREThe CRE category indicates events generated from a custom offense or event
rule. The associated low-level event categories include:
Table 2-17 CRE Category
Low Level Event
Category
Description
Unknown CRE EventIndicates an unknown custom
rules engine event.
Single Event Rule
Match
Event Sequence Rule
Match
Cross-Offense Event
Sequence Rule Match
Indicates a single event rule
match.
Indicates an event sequence
rule match.
Indicates a cross-offense
event sequence rule match.
exploits and buffer overflow attempts. The associated low-level event categories
include:
Table 2-18 Potential Exploit Category
Low Level Event
Category
Unknown Potential
Exploit Attack
Description
Indicates a potential
exploitative attack has been
detected.
Potential Buffer
Overflow
Indicates a potential buffer
overflow has been detected.
Potential DNS ExploitIndicates a potentially
exploitative attack through the
DNS server has been
detected.
Potential Telnet
Exploit
Indicates a potentially
exploitative attack through
Telnet has been detected.
Potential Linux Exploit Indicates a potentially
exploitative attack through
Linux has been detected.
Potential Unix ExploitIndicates a potentially
exploitative attack through
Unix has been detected.
Potential Windows
Exploit
Indicates a potentially
exploitative attack through
Windows has been detected.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
7Correlation Group 1 Scenar io 2
7Correlation Group 1 Scenar io 2
7Correlation Group 1 Scenar io 2
7Correlation Group 1 Scenar io 2
7Correlation Group 1 Scenar io 2
7Correlation Group 1 Scenar io 2
7Correlation Group 1 Scenar io 2
STRM Event Category Correlation Reference
Page 41
Table 2-18 Potential Exploit Category (continued)
SIM Audit35
Low Level Event
Category
Description
Potential Mail ExploitIndicates a potentially
exploitative attack through
mail has been detected.
Potential Infrastructure
Exploit
Indicates a potential
exploitative attack on the
system infrastructure has
been detected.
Potential Misc ExploitIndicates a potentially
exploitative attack has been
detected.
Potential Web ExploitIndicates a potentially
exploitative attack through the
web has been detected.
Potential Botnet
connection
Indicates a potentially
exploitative attack using
Botnet has been detected.
Potential worm activity Indicates a potentially
exploitive attack using worm
activity has been detected.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
7Correlation Group 1 Scenario 2
7Correlation Group 1 Scenario 2
7Correlation Group 1 Scenario 2
7Correlation Group 1 Scenario 2
6Correlation Group 1 Scenario 2
6Correlation Group 1 Scenario 2
SIM AuditThe SIM Audit events category indi cates events related to user interaction with the
Console and the Administration Console. User logins and configuration changes
will generate events that are sent to the Event Collector, which correlates with
other security events from the network. The associated low-level event categories
include:
Table 2-19 SEM Audit Event Category
Low Level Event
Category
SIM User
Authentication
SIM Configuration
Change
Description
Indicates a user login or
logout on the Console.
Indicates that a user has
made a change to the SIM
configuration or deployment.
SIM User ActionIndicates that a user has
initiated a process in the SIM
module. This may include
starting a backup process or
generated a report.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
5Correlation Group 5 Scenario 2
3Correlation Group 5 Scenario 2
3Correlation Group 5 Scenario 2
STRM Event Category Correlation Reference
Page 42
36EVENT CATEGORY CORRELATION
VIS Host DiscoveryWhen the VIS component discovers and stores new hosts, ports, or vulnerabilities
detected on the network, the VIS component generates events. These events are
sent to the Event Collector to be correlated with other security events.
The associated low-level event categories include:
Table 2-20 VIS Host Discovery Category
Low Level Event
Category
New Host DiscoveredIndicates that the VIS
New Port DiscoveredIndicates that the VIS
New Vuln DiscoveredIndicates that the VIS
New OS DiscoveredIndicates that the VIS
Bulk Host DiscoveredIndicates that the VIS
Description
component has detected a
new host.
component has detected a
new open port.
component has detected a
new vulnerability.
component has detected a
new operating system on a
host.
component has detected
many new hosts in a short
period of time.
Severity Level
(0 to 10)
3Correlation Group 5 Scenar io 2
3Correlation Group 5 Scenar io 2
3Correlation Group 5 Scenar io 2
3Correlation Group 5 Scenar io 2
3Correlation Group 5 Scenar io 2
Event Correlation/
Processing
Additional Event
Processing
ApplicationThe Application category indicates events relating to application activity, such as
e-mail or FTP activity. The associated low-level event categories include:
Table 2-21 Application Category
Low Level Event
CategoryDescription
Mail OpenedIndicates that an e-mail
connection was established.
Mail ClosedIndicates that an e-mail
connection was closed.
Mail ResetIndicates that an e-mail
connection was reset.
Mail TerminatedIndicates that an e-mail
connection was terminated.
Mail DeniedIndicates that an e-mail
connection was denied.
Severity Level
(0 to 10)
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Event Correlation/
Processing
Additional Event
Processing
Page 43
Table 2-21 Application Category (continued)
Application37
Low Level Event
Category
Description
Mail in ProgressIndicates that an e-mail
connection is being
attempted.
Mail DelayedIndicates that an e-mail
connection was delayed.
Mail QueuedIndicates that an e-mail
connection was queued.
Mail RedirectedIndicates that an e-mail
connection was redirected.
FTP OpenedIndicates that an FTP
connection was opened.
FTP ClosedIndicates that an FTP
connection was closed.
FTP ResetIndicates that an FTP
connection was reset.
FTP TerminatedIndicates that an FTP
connection was terminated.
FTP DeniedIndicates that an FTP
connection was denied.
FTP In ProgressIndicates that an FTP
connection is currently in
progress.
FTP Redirected Indicates that an FTP
connection was redirected.
HTTP OpenedIndicates that an HTTP
connection was established.
HTTP ClosedIndicates that an HTTP
connection was closed.
HTTP ResetIndicates that an HTTP
connection was reset.
HTTP TerminatedIndicates that an HTTP
connection was terminated.
HTTP DeniedIndicates that an HTTP
connection was denied.
HTTP In ProgressIndicates that an HTTP
connection is currently in
progress.
HTTP DelayedIndicates that an HTTP
connection was delayed.
HTTP QueuedIndicates that an HTTP
connection was queued.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 44
38EVENT CATEGORY CORRELATION
Table 2-21 Application Category (continued)
Low Level Event
Category
Description
HTTP RedirectedIndicates that an HTTP
connection was redirected.
HTTP ProxyIndicates that an HTTP
connection is being proxied.
HTTPS OpenedIndicates that an HTTPS
connection was established.
HTTPS ClosedIndicates that an HTTPS
connection was closed.
HTTPS ResetIndicates that an HTTPS
connection was reset.
HTTP TerminatedIndicates that an HTTPS
connection was terminated.
HTTPS DeniedIndicates that an HTTPS
connection was denied.
HTTPS In ProgressIndicates that an HTTPS
connection is currently in
progress.
HTTPS DelayedIndicates that an HTTPS
connection was delayed.
HTTPS QueuedIndicates that an HTTPS
connection was queued.
HTTPS RedirectedIndicates that an HTTPS
connection was redirected.
HTTPS ProxyIndicates that an HTTPS
connection is proxied.
SSH OpenedIndicates than an SSH
connection was established.
SSH ClosedIndicates that an SSH
connection was closed.
SSH ResetIndicates that an SSH
connection was reset.
SSH TerminatedIndicates that an SSH
connection was terminated.
SSH DeniedIndicates that an SSH session
was denied.
SSH In ProgressIndicates that an SSH session
is currently in progress.
RemoteAccess
Opened
Indicates that a remote
access connection was
established.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 45
Table 2-21 Application Category (continued)
Application39
Low Level Event
Category
Description
RemoteAccess Closed Indicates that a remote
access connection was
closed.
RemoteAccess ResetIndicates that a remote
access connection was reset.
RemoteAccess
Terminated
Indicates that a remote
access connection was
terminated.
RemoteAccess
Denied
Indicates that a remote
access connection was
denied.
RemoteAccess In
Progress
Indicates that a remote
access connection is currently
in progress.
RemoteAccess
Delayed
Indicates that a remote
access connection was
delayed.
RemoteAccess
Redirected
Indicates that a remote
access connection was
redirected.
VPN OpenedIndicates that a VPN
connection was opened.
VPN ClosedIndicates that a VPN
connection was closed.
VPN ResetIndicates that a VPN
connection was reset.
VPN TerminatedIndicates that a VPN
connection was terminated.
VPN DeniedIndicates that a VPN
connection was denied.
VPN In ProgressIndicates that a VPN
connection is currently in
progress.
VPN DelayedIndicates that a VPN
connection was delayed
VPN QueuedIndicates that a VPN
connection was queued.
VPN RedirectedIndicates that a VPN
connection was redirected.
RDP OpenedIndicates that an RDP
connection was established.
RDP ClosedIndicates that an RDP
connection was closed.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 46
40EVENT CATEGORY CORRELATION
Table 2-21 Application Category (continued)
Low Level Event
Category
Description
RDP ResetIndicates that an RDP
connection was reset.
RDP TerminatedIndicates that an RDP
connection was terminated.
RDP DeniedIndicates that an RDP
connection was denied.
RDP In ProgressIndicates that an RDP
connection is currently in
progress.
RDP RedirectedIndicates that an RDP
connection was redirected.
FileTransfer OpenedIndicates that a file transfer
connection was established.
FileTransfer ClosedIndicates that a file transfer
connection was closed.
FileTransfer ResetIndicates that a file transfer
connection was reset.
FileTransfer
Terminated
Indicates that a file transfer
connection was terminated.
FileTransfer DeniedIndicates that a file transfer
connection was denied.
FileTransfer In
Progress
Indicates that a file transfer
connection is currently in
progress.
FileTransfer DelayedIndicates that a file transfer
connection was delayed.
FileTransfer QueuedIndicates that a file transfer
connection was queued.
FileTransfer
Redirected
Indicates that a file transfer
connection was redirected.
DNS Opened Indicates that a DNS
connection was established.
DNS ClosedIndicates that a DNS
connection was closed.
DNS ResetIndicates that a DNS
connection was reset.
DNS TerminatedIndicates that a DNS
connection was terminated.
DNS DeniedIndicates that a DNS
connection was denied.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 47
Table 2-21 Application Category (continued)
Application41
Low Level Event
Category
Description
DNS In ProgressIndicates that a DNS
connection is currently in
progress.
DNS DelayedIndicates that a DNS
connection was delayed.
DNS RedirectedIndicates that a DNS
connection was redirected.
Chat OpenedIndicates that a chat
connection was opened.
Chat ClosedIndicates that a chat
connection was closed.
Chat ResetIndicates that a chat
connection was reset.
Chat TerminatedIndicates that a chat
connection was terminated.
Chat DeniedIndicates that a chat
connection was denied.
Chat In ProgressIndicates that a chat
connection is currently in
progress.
Chat RedirectedIndicates that a chat
connection was redirected.
Database OpenedIndicates that a database
connection was established.
Database ClosedIndicates that a database
connection was closed.
Database ResetIndicates that a database
connection was reset.
Database TerminatedIndicates that a database
connection was terminated.
Database DeniedIndicates that a database
connection was denied.
Database In ProgressIndicates that a database
connection is currently in
progress.
Database RedirectedIndicates that a database
connection was redirected.
SMTP OpenedIndicates that an SMTP
connection was established.
SMTP ClosedIndicates that an SMTP
connection was closed.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 48
42EVENT CATEGORY CORRELATION
Table 2-21 Application Category (continued)
Low Level Event
Category
Description
SMTP ResetIndicates that an SMTP
connection was reset.
SMTP TerminatedIndicates that an SMTP
connection was terminated.
SMTP DeniedIndicates that an SMTP
connection was denied.
SMTP In ProgressIndicates that an SMTP
connection is currently in
progress.
SMTP DelayedIndicates that an SMTP
connection was delayed.
SMTP QueuedIndicates that an SMTP
connection was queued.
SMTP RedirectedIndicates that an SMTP
connection was redirected.
Auth OpenedIndicates that an authorization
server connection was
established.
Auth ClosedIndicates that an authorization
server connection was closed.
Auth ResetIndicates that an authorization
server connection was reset.
Auth TerminatedIndicates that an authorization
server connection was
terminated.
Auth DeniedIndicates that an authorization
server connection was
denied.
Auth In ProgressIndicates that an authorization
server connection is currently
in progress.
Auth DelayedIndicates that an authorization
server connection was
delayed.
Auth QueuedIndicates that an authorization
server connection was
queued.
Auth RedirectedIndicates that an authorization
server connection was
redirected.
P2P Opened Indicates that a Peer-to-Peer
(P2P) connection was
established.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
3Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
5Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
2Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 49
Table 2-21 Application Category (continued)
Application43
Low Level Event
Category
Description
P2P ClosedIndicates that a P2P
connection was closed.
P2P ResetIndicates that a P2P
connection was reset.
P2P TerminatedIndicates that a P2P
connection was terminated.
P2P DeniedIndicates that a P2P
connection was denied.
P2P In ProgressIndicates that a P2P
connection is currently in
progress.
Web OpenedIndicates that a web
connection was established.
Web ClosedIndicates that a web
connection was closed.
Web ResetIndicates that a web
connection was reset.
Web TerminatedIndicates that a web
connection was terminated.
Web DeniedIndicates that a web
connection was denied.
Web In ProgressIndicates that a web
connection is currently in
progress.
Web DelayedIndicates that a web
connection was delayed.
Web QueuedIndicates that a web
connection was queued.
Web RedirectedIndicates that a web
connection was redirected.
Web Proxy Indicates that a web
connection was proxied.
VoIP OpenedIndicates that a Voice Over IP
(VoIP) connection was
established.
VoIP ClosedIndicates that a VoIP
connection was closed.
VoIP ResetIndicates that a VoIP
connection was reset.
VoIP TerminatedIndicates that a VoIP
connection was terminated.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
1Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
4Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
STRM Event Category Correlation Reference
Page 50
44EVENT CATEGORY CORRELATION
Table 2-21 Application Category (continued)
Low Level Event
Category
Description
VoIP DeniedIndicates that a VoIP
connection was denied.
VoIP In ProgressIndicates that a VoIP
connection is currently in
progress.
VoIP DelayedIndicates that a VoIP
connection was delayed.
VoIP RedirectedIndicates that a VoIP
connection was redirected.
Suspicious Protocol
Usage
Indicates that suspicious
protocol usage was detected.
Severity Level
(0 to 10)
Event Correlation/
Processing
Additional Event
Processing
3Correlation Group 3 Scenario 2
1Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
3Correlation Group 3 Scenario 2
5Correlation Group 2 Scenario 2
STRM Event Category Correlation Reference
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.