Skip to content

Commit 9195400

Browse files
authored
Indent fix
1 parent bb7f464 commit 9195400

File tree

1 file changed

+2
-16
lines changed

1 file changed

+2
-16
lines changed

articles/sentinel/anomalies-reference.md

Lines changed: 2 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -457,14 +457,7 @@ Configuration details:
457457

458458
### Domain Reputation Palo Alto anomaly (DISCONTINUED)
459459

460-
**Description:** This algorithm evaluates the reputation for all domains seen specifically in Palo Alto firewall (PAN-OS product) logs. A high anomaly score indicates a low reputation, suggesting that the domain has been observed to host malicious content or is likely to do so.
461-
462-
| Attribute | Value |
463-
| -------------------------------- | ------------------------------------------------------------------ |
464-
| **Anomaly type:** | Customizable machine learning |
465-
| **Data sources:** | CommonSecurityLog (PAN) |
466-
| **MITRE ATT&CK tactics:** | Command and Control |
467-
| **MITRE ATT&CK techniques:** | T1568 - Dynamic Resolution |
460+
**Description:** This algorithm evaluates the reputation for all domains seen specifically in Palo Alto firewall (PAN-OS product) logs. A high anomaly score indicates a low reputation, suggesting that the domain has been observed to host malicious content or is likely to do so.
468461

469462
[Back to Machine learning-based anomalies list](#machine-learning-based-anomalies) | [Back to top](#anomalies-detected-by-the-microsoft-sentinel-machine-learning-engine)
470463

@@ -522,14 +515,7 @@ Configuration details:
522515

523516
### Multi-region logins in a single day via Palo Alto GlobalProtect (DISCONTINUED)
524517

525-
**Description:** This algorithm detects a user account which had sign-ins from multiple non-adjacent regions in a single day through a Palo Alto VPN.
526-
527-
| Attribute | Value |
528-
| -------------------------------- | ------------------------------------------------------------------ |
529-
| **Anomaly type:** | Customizable machine learning |
530-
| **Data sources:** | CommonSecurityLog (PAN VPN) |
531-
| **MITRE ATT&CK tactics:** | Defense Evasion<br>Initial Access |
532-
| **MITRE ATT&CK techniques:** | T1078 - Valid Accounts |
518+
**Description:** This algorithm detects a user account which had sign-ins from multiple non-adjacent regions in a single day through a Palo Alto VPN.
533519

534520
[Back to Machine learning-based anomalies list](#machine-learning-based-anomalies) | [Back to top](#anomalies-detected-by-the-microsoft-sentinel-machine-learning-engine)
535521

0 commit comments

Comments
 (0)