10 SIEM Scenarios With Very Low False-Positive Rates and Mostly Unique

Ertugrul Akbas
2 min readMar 4, 2023

--

  • Warn if a user does something they’ve never done before
  • Warn if a user who has not had a VPN for at least 15 days (20,30,40…265 days) has remote interactive logon on more than one (1) workstation in a short time.
  • No Activity for more than 60 Days:- This account has not logged in for over 60 days
  • Warn if a user has visited the malicious categories on the proxy at least once a day for a week. (Bot Networks, Uncategorized, Malware, Spyware, Dynamic DNS, Encrypted Upload)
  • If there is port usage, which is very rare (like under %3)
  • Password changes for the same user more than three within 45 days
  • Detect the ratio of login success versus failure per user anomaly.
  • Monitor all access and logins during non-working hours. Checks the geolocation to find unusual behavior (Never seen before)
  • Warn if the time between two logins failed events of the same user is less than one minute.
  • Mail Masquerade Detection: Alert, if an e-mail was received from e-mail addresses similar to the original e-mail address like: ali.veli@citibank.com and ali.veli@citibαnk.com

--

--

Ertugrul Akbas
Ertugrul Akbas

Written by Ertugrul Akbas

Entrepreneur,Security Analyst,Research.

No responses yet