Unusual internal access to network device management interface

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2026-03-15
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

Unusual internal access to Palo Alto Networks device on management port.

Attacker's Goals

Attackers aim to compromise network infrastructure to redirect traffic, create illegitimate VPN tunnels, modify ACLs (Access Control Lists) to bypass segmentation, or perform Man-in-the-Middle (MitM) attacks.

Investigative actions

  • Identify the source address and machine role (e.g., Is it a known Admin Jump Host or a standard workstation?).
  • Validate if a change request exists for the target network device at the time of the event.
  • Check the connection protocol (SSH/HTTPS vs. insecure Telnet/HTTP) and the port used.
  • Review the login status: Was the authentication successful or failed?
  • Investigate the source machine for network scanning tools or terminal clients (e.g., PuTTY, SecureCRT).
  • Analyze the causality chain: Did a suspicious process launch the connection?.
  • Check if the user associated with the source address has network administration privileges.