Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Identity Threat Module |
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
A user connected a new USB storage device that was not seen for this user and host in the last 30 days.
Attacker's Goals
The attacker may use a USB storage device connection for data exfiltration or data collection.
Investigative actions
Investigate the USB storage device related process and file events to determine if it was used for legitimate purposes or malicious activity.