Managed Sentinel – Alert 231
|Alert Name||Connections to malicious IPs from internal hosts|
|Description||This will alert when a connection from an internal host to an Internet malicious IP address is detected. This alert is using a correlation with Windows AD|
|Threat Indicator||Compromised Host|
|MITRE ATT&CK Tactics||Initial Access|
|False Positive||Browsers Adware|
Incorrect Threat Intelligence feed
|Recommendations||1. Investigate the type of traffic allowed to the malicious IP address (e.g web, dns, smtp).|
2. Manually perform a validation of the malicious IP address on external Threat Intell sources (e.g www.abuseIPdb.com).
3. Identify the number of requests within a specific period of time which could be an solid indicator of a compromised host.
4. Perform a AV/AM scan for the affected internal machine
5. Complete a Sentinel investigation for the same entity (IP address or user account) to understand if any other lateral attacks were completed while connecting to VPN to corporate network