Rules Contributing to Suspicious OCI Scanning Activity Alert

This topic covers a feature that is not available for all customers yet. See Early Access Program Features and Topics Under Development.
The following rules are used to identify suspicious scanning activity in OCI. Any one or more of these will trigger the Suspicious OCI Scanning Activity Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
OCI SSH Scanner |
Detects possible SSH scanning activity. More details
![]() Rule IDQuery{'selection1': {'action': 'REJECT', 'dstip_type': 'private', 'dstport': 22}, 'selection2': {'srcip_type': 'private'}, 'condition': 'selection1 and not selection2 | count(dstip) by srcip > 5', 'timeframe': '5m'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity75 Suppression Logic Based On
Additional Information
|