1
1
name : Prohibited Network Traffic Allowed
2
2
id : ce5a0962-849f-4720-a678-753fe6674479
3
- version : 8
4
- date : ' 2025-05-27 '
3
+ version : 9
4
+ date : ' 2025-06-17 '
5
5
author : Rico Valdez, Splunk
6
6
status : production
7
7
type : TTP
@@ -14,7 +14,6 @@ description: The following analytic detects instances where network traffic, ide
14
14
allow attackers to bypass network defenses, leading to potential data breaches and
15
15
compromising the organization's security posture.
16
16
data_source :
17
- - Zeek Conn
18
17
- Cisco Secure Firewall Threat Defense Connection Event
19
18
search : ' | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
20
19
as lastTime from datamodel=Network_Traffic where All_Traffic.action IN ("allowed", "allow") by
@@ -28,7 +27,7 @@ how_to_implement: In order to properly run this search, Splunk needs to ingest d
28
27
into an environment. This is necessary so that the search can identify an 'action'
29
28
taken on the traffic of interest. The search requires the Network_Traffic data model
30
29
be populated.
31
- known_false_positives : None identified
30
+ known_false_positives : Unknown
32
31
references : []
33
32
drilldown_searches :
34
33
- name : View the detection results for - "$src_ip$"
67
66
- Splunk Enterprise Security
68
67
- Splunk Cloud
69
68
security_domain : network
70
- manual_test : This detection uses builtin lookup from Enterprise Security.
69
+ manual_test : This detection uses a builtin lookup from Enterprise Security.
71
70
tests :
72
- - name : Zeek Conn True Positive Test
73
- attack_data :
74
- - data : https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1048/ftp_connection/zeek_conn.log
75
- sourcetype : bro:conn:json
76
- source : conn.log
77
71
- name : Cisco Secure Firewall True Positive Test
78
72
attack_data :
79
73
- data : https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/cisco_secure_firewall_threat_defense/connection_event/connection_events.log
0 commit comments