Rare MS-Update traffic over HTTP

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2025-10-27
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • Palo Alto Networks Platform Logs

Detection Modules

Detector Tags

ATT&CK Tactic

Lateral Movement (TA0008)

ATT&CK Technique

Exploitation of Remote Services (T1210)

Severity

Informational

Description

The endpoint requested an MS-Update operation with abnormal HTTP traffic characteristics.

Attacker's Goals

  • The Windows Server Update Services enables machines to discover and download software updates from a dedicated update server.
  • Attacker may use the MS-Update protocol to execute unauthorized code through Microsoft binaries.

Investigative actions

  • Inspect the legitimacy of the server as a WSUS functioning server.
  • Verify that your MS-Update network routine is of HTTPS enforced
  • Verify that this MS-Update server is not a newly deployed server as part of a legitimate IT activity.