Exfiltration after Infection

Description

This threat is generated when a device exhibits behavior outside of the normal baseline that indicates a compromise. It further differentiates itself by including data exfiltration associated with that device.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection, Security Monitoring

Category

Data Exfiltration, Account Compromise, Malware

Alert Volume

Low (?)

SPL Difficulty

None

Journey

Stage 6

Data Sources

Windows Security
Application Data
Network Communication
Web Server
Authentication
DLP
Physical Security
Email
Endpoint Detection and Response
Web Proxy