Searching for Information

Searching for Information (Windows/Mac)

The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: SEARCHING FOR INFORMATION.

ALERT RULE

Description

Browsing information outlets (WikiLeaks-like)

An alert is triggered upon browsing to information-leak websites such as WikiLeaks in order to either publish or read sensitive information.

Running advanced monitoring or sniffing

An alert is triggered upon running a monitoring or sniffing tool which is part of a predefined list. The usage of such tools could indicate a user attempt to obtain information which might be sensitive.

Searching data on Darknet's TOR (The Onion Router)

An alert is triggered upon searching predefined keywords (including the name of tools) related to TOR (The Onion Router) which is included in the Darknet in web search engines.

Searching data on Dynamic-DNS

An alert is triggered upon searching predefined keywords (including the name of tools) related to Dynamic-DNS tools in web search engines.

Searching data on file transfer (FTP or SFTP)

An alert is triggered upon searching predefined keywords including the name of tools) related to FTP/SFTP tools in web search engines.

Searching data on hacking or spoofing

An alert is triggered upon searching predefined keywords (including the name of tools) related to hacking or spoofing tools in web search engines.

Searching data on monitoring or sniffing

An alert is triggered upon searching predefined keywords (including the name of tools) related to monitoring or sniffing tools in web search engines.

Searching data on password cracking

An alert is triggered upon searching predefined keywords (including the name of tools) related to password cracking tools in web search engines.

Searching data on Remote Access and Desktop Sharing

An alert is triggered upon searching predefined keywords (including the name of tools) related to remote access and desktop sharing tools in web search engines.

Searching data on steganography

An alert is triggered upon searching predefined keywords (including the name of tools) related to steganography tools in web search engines. Such tools are usually used to conceal text information within images, and by doing this block data exfiltration tools to detect the data leak.

Searching data on VPN, Proxy or Tunneling

An alert is triggered upon searching predefined keywords (including the name of tools) related to VPN, proxy, or tunneling tools in web search engines.

Searching for technical information on the ObserveIT monitoring solution

An alert is triggered upon browsing to the ITM On-Prem (ObserveIT) website, the official ITM On-Prem (ObserveIT) documentation, or upon opening the folder in which the product is installed. Any of these actions could potentially indicate an attempt to tamper with the monitoring solution.

Searching sensitive files or folders

An alert is triggered upon invoking the built-in search of Windows Explorer on a predefined sensitive file or folder name.