Suspicious Data Collection

Description

This threat is generated when a user (or group of users) exhibit behavior that indicates the user is involved in data collection.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection, Security Monitoring, Insider Threat

Category

Adversary Tactics, Endpoint Compromise, Malware, Insider Threat

Alert Volume

Low (?)

SPL Difficulty

None

Journey

Stage 6

Data Sources

Application Data
Audit Trail
Host-based IDS
Network Communication
Anti-Virus or Anti-Malware
IDS or IPS
DLP
Email
Endpoint Detection and Response
Web Proxy