Infected Host

Description

This threat looks for a suspicious first step such as a suspicious powershell command or USB insertion.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection, Security Monitoring

Category

Adversary Tactics, Endpoint Compromise, Malware

Alert Volume

Low

Journey

Stage 4

Data Sources

Anti-Virus or Anti-Malware
IDS or IPS
DLP
Host-based IDS
DNS
Endpoint Detection and Response
Authentication
Windows Security
Network Communication
Email
Web Proxy