Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
Unusual internal access to Palo Alto Networks device on management port.
Attacker's Goals
Attackers aim to compromise network infrastructure to redirect traffic, create illegitimate VPN tunnels, modify ACLs (Access Control Lists) to bypass segmentation, or perform Man-in-the-Middle (MitM) attacks.
Investigative actions
- Identify the source address and machine role (e.g., Is it a known Admin Jump Host or a standard workstation?).
- Validate if a change request exists for the target network device at the time of the event.
- Check the connection protocol (SSH/HTTPS vs. insecure Telnet/HTTP) and the port used.
- Review the login status: Was the authentication successful or failed?
- Investigate the source machine for network scanning tools or terminal clients (e.g., PuTTY, SecureCRT).
- Analyze the causality chain: Did a suspicious process launch the connection?.
- Check if the user associated with the source address has network administration privileges.