Last updated
Last updated
this query provides general information on the pcap file
this query focuses on Windows networking activity and details the source and destination addresses and named pipe, endpoint and operation detection. the output of this specific query may assist analysts in understanding specific Windows events such as SMB enumeration, logins and service exploitation
these two queries provide information on unique connections and connection-data correlation. these two when combined can assist analysts in detecting weird & malicious connections along with suspicious and beaconing activities
these two queries when combined can help analysts detect anomalous DNS and HTTP traffic
this query helps analysts in detecting possible data leakage attempts and suspicious file activity.
this query helps analysts in detecting possible communications outside the scope
these queries provide information based on Suricata rule results