Security Command Center analyzes various logs for potential threats that affect network resources. For recommended responses to these threats, see Respond to network threat findings.
The following log-based detections are available with Event Threat Detection:
Active Scan: Log4j Vulnerable to RCECloud IDS: THREAT_IDENTIFIERCommand and Control: DNS TunnelingDefense Evasion: VPC Route Masquerade AttemptImpact: VPC Firewall High Priority BlockImpact: VPC Firewall Mass Rule DeletionInitial Access: Log4j Compromise AttemptLog4j Malware: Bad DomainLog4j Malware: Bad IPMalware: bad domainMalware: bad IPMalware: Cryptomining Bad DomainMalware: Cryptomining Bad IPWhat's next
- Learn about Event Threat Detection.
- Learn how to respond to network threat findings.
- Refer to the Threat findings index.