Policy Activity Filters

Applies To: ThreatSync+ NDR

You can create custom ThreatSync+ NDR policies to monitor traffic flows and the events that ThreatSync+ NDR detects. To define a custom policy, you configure a source zone, a destination zone, and an activity filter. The activity filter enables you to evaluate traffic or event logs between the selected zones, triggering when the activity filter is matched.

When you filter traffic, activity filters can match:

  • The ports in the traffic flows.
  • The conversation class — a combination of the protocol type (TCP, UDP, or ICMP) and the type of conversation (for example, 2-way, unresponsive scan or malformed).
  • The volume of data in the traffic flows.

When you filter on events, activity filters can match:

  • The type of anomaly the event represents.
  • The ports in the event logs.
  • The conversation class — a combination of the protocol type (TCP, UDP, or ICMP) and the type of conversation (for example, 2-way, unresponsive scan or malformed)

ThreatSync+ NDR policies support these activity filters:

Filter Type Filter Name Description
Zone Source IP address A valid IPv4 address.
Zone Destination IP address A valid IPv4 address.
Zone Source MAC address A valid MAC address that uniquely identifies a device. Detected only when DHCP logs are available and automatically saved in the Asset name text box.
Zone Destination MAC address A valid MAC address that uniquely identifies a device. Detected only when DHCP logs are available and automatically saved in the Asset name field.
Zone Source Host Name A string that represents a device. Detected only when DHCP logs are available and automatically saved in the Asset name text box
Zone Destination Host Name A string that represents a device. Detected only when DHCP logs are available and automatically saved in the Asset name text box.
Zone Source Internal/External Indicator of whether the device has an internal (private) IP address or an external (public) IP address. If public IP addresses are used in your enterprise network, you can assign them to be internal from the Zones page.
Zone Destination Internal/External Indicator of whether the device has an internal (private) IP address or an external (public) IP address. If public IP addresses are used in your enterprise network, you can assign them to be internal from the Zones page.
Zone Source Country The country name determined from the IP address. Must match a country in the metadata list that ThreatSync+ NDR uses.

Zone

Destination Country The country name determined from the IP address. Must match a country in the metadata list that ThreatSync+ NDR uses.
Zone Source Locality The locality (city, state) name determined from the IP address. Must match a country in the metadata list that ThreatSync+ NDR uses.
Zone Destination Locality The locality (city, state) name determined from the IP address. Must match a country in the metadata list that ThreatSync+ NDR uses.
Zone Source Domain The second level domain name as determined by the IP address, defined by the Internet Assigned Numbers Authority (IANA) registration data.
Zone Destination Domain The second level domain name as determined by the IP address, defined by IANA registration data.
Zone Source Organization The administrative organization name as determined by the IP address, defined by IANA registration data.
Zone Destination Organization The administrative organization name as determined by the IP address, defined by IANA registration data.
Zone Source Asset The assigned name of an asset, either by an administrator in the Asset Settings, or dynamically by the system as a MAC Address or host name.
Zone Destination Asset The assigned name of an asset, either by an administrator in the Asset Settings, or dynamically by the system as a MAC address or host name.
Conversation Source Port The source port.
Conversation Destination Port The destination port.
Conversation Application Port The source or destination port that represents the application that owns the port. This is usually the destination port for flows in the request direction and the source port for flows in the response direction
Conversation Conversation Originator Indicates if the traffic flow represents the request or response traffic of a 2-way conversation. Filter by selecting Traffic Flow from a source to a destination. To filter for both request and response traffic, select Traffic Flow Between source and destination.
Conversation Traffic Volume The total count of bytes in traffic flows.
Conversation Conversation Class An indicator of the type of conversation. Possible values are ICMP Normal, ICMP Scanning, ICMP Unknown, TCP Malformed, TCP Normal, TCP Scanning, UDP Malformed, UDP One-Way, and UDP Two-Way
Event Beaconing Through Web API Detected periodic traffic through a Web Service API that indicates possible tunneling through a public web site.
Event High Volume from Source IP Detected traffic from a source that has significantly exceeded the expected baseline volume.
Event Irregular ICMP Conversation Detected unusual ICMP traffic that indicates possible network scanning, mapping, and data exfiltration.
Event Abnormally Fast ICMP Flow from Inbound to Outbound Detected unusual fast inbound to outbound ICMP traffic that indicates possible scanning and data exfiltration.
Event NetFlow High Ports Only Traffic flows between high ports detected. This might indicate unauthorized traffic such as BitTorrent activity.
Event Large Volume from Asset Detected traffic from an asset significantly exceeds the baseline volume.
Event Large Volume to Asset Detected traffic to an asset significantly exceeds the baseline volume.
Event Large Packet Count from Asset Detected traffic from an asset significantly exceeds the expected baseline packet count.
Event Large Packet Count to Asset Detected traffic to an asset significantly exceeds the expected baseline packet count.
Event Data Sent to Large Number of Hosts The count of destinations seen in traffic from a source exceeds the baseline.
Event Data Received from Large Number of Hosts The count of sources seen in traffic sent to a device exceeds the baseline.
Event Data Sent To Large Number of Cities The count of destination localities seen in traffic from a source exceeds the baseline.
Event Data Received From Large Number Of Cities The count of source localities seen in traffic sent to a device exceeds the baseline.
Event Unusual Outgoing connection duration The average outgoing connection duration from a device was significantly different from the baseline.
Event Unusual Incoming connection duration The average incoming connection duration to a device was significantly different from the baseline.
Event High Ratio of Outgoing Bytes Per Incoming Bytes The ratio was significantly higher than the baseline.
Event High Ratio Of Incoming Bytes Per Outgoing Bytes The ratio was significantly higher than the baseline.
Event High Ratio of Outgoing Packets Per Incoming Packets The ratio was significantly higher than the baseline.
Event High Ratio of Incoming Packets Per Outgoing Packets The ratio was significantly higher than the baseline.
Event High Rate of Incoming Bytes The rate was significantly higher than the baseline.
Event High Rate of Outgoing Bytes The rate was significantly higher than the baseline.
Event High Rate of Incoming Packets The rate was significantly higher than the baseline.
Event High Rate of Outgoing Packets The rate was significantly higher than the baseline.
Event High Count of Incoming Flows The count was significantly higher than the baseline.
Event High Count of Outgoing Flows The count was significantly higher than the baseline.
Event Unusual Rate of Incoming Bytes Per Flow The rate was significantly different than the baseline.
Event Unusual Rate of Outgoing Bytes Per Flow The rate was significantly different than the baseline.
Event Unexpected Port Accessed on Asset Significant traffic was seen to an asset on a port unrelated to a role assigned to that asset.
Event High Ratio of Incoming Bytes to Incoming Packets The ratio was significantly higher than the baseline.
Event High Ratio Of Outgoing Bytes to Outgoing Packets The ratio was significantly higher than the baseline.
Event Connection to New Organization Activity detected from a node to an organization that has not previously been communicated with on your network.
Event Connection to New Domain Activity detected from a node to a domain that has not previously been communicated with on your network.
Event Connection to New Locality Activity detected from a node to a locality that has not previously been communicated with on your network.
Event Connection to New Host Activity detected from a node to a IP address that has not previously been communicated with on your network.
Event Connection from New Organization Activity detected to a node from an organization that has not previously been communicated with on your network.
Event Connection from New Domain Activity detected to a node from a domain that has not previously been communicated with on your network.
Event Connection from New Locality Activity detected to a node from a locality that has not previously been communicated with on your network.
Event Connection from New Host Activity detected to a node from an IP address that has not previously been communicated with on your network.
Event Unusual Total Outgoing Connection Duration The total outgoing connection duration from a device was significantly different from the baseline.
Event Unusual Total Incoming Connection Duration The total incoming connection duration to a device was significantly different from the baseline.
Event Suspected High Throughput DNS Tunnel Activity indicates the presence of a DNS tunnel with high volume.
Event Suspected Low Throughput DNS Tunnel Activity indicates the presence of a DNS tunnel with low volume.
Event Suspected RDP Tunnel Activity indicates the presence of an RDP tunnel.
Event Suspected RDP Session Activity indicates the presence of an RDP session.
Event Suspected RDP Attempt Activity indicates the attempt to initiate an RDP tunnel.
Event Fast Vertical Port Scan Activity indicates a port scan of a destination IP address in a short amount of time.
Event Slow Vertical Port Scan Activity indicates a port scan of a destination IP address over a longer amount of time.
Event Fast Horizontal Port Scan Activity indicates a scan of similar ports to at least 8 destination IP addresses in a short amount of time.
Event Blocklist IP Address Activity to an IP address on the ThreatSync+ NDR blocklist was detected.

Related Topics

About ThreatSync+ NDR Policies and Zones

Configure ThreatSync+ NDR Policies