Abnormal RPC traffic to multiple hosts

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-06-24
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

1 Hour

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • Palo Alto Networks Platform Logs
      OR
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

ATT&CK Tactic

Reconnaissance (TA0043)

ATT&CK Technique

Severity

Low

Description

The endpoint performed unfamiliar RPC activity to multiple hosts.

Attacker's Goals

An adversary may enumerate different protocols to gain information and plan its lateral movement over the network.

Investigative actions

  • Check if the host is a newly deployed server that provides RPC based services to multiple hosts.
  • Verify the legitimacy of the actor process (and its causality) that initiated this RPC traffic.

Variations

Abnormal RPC traffic to multiple IPs

Synopsis

ATT&CK Tactic

Reconnaissance (TA0043)

ATT&CK Technique

Severity

Informational

Description

The endpoint performed unfamiliar RPC activity to multiple hosts.

Attacker's Goals

An adversary may enumerate different protocols to gain information and plan its lateral movement over the network.

Investigative actions

  • Check if the host is a newly deployed server that provides RPC based services to multiple hosts.
  • Verify the legitimacy of the actor process (and its causality) that initiated this RPC traffic.