Logo
Sign in
  1. Logpoint Service Desk
  2. Products Hub
  3. Marketplace
default.png

Use Case

 

Release Details
Version:5.1.2
Release date:June 8, 2022
Documentation:UseCases guide
SHA 256: f5ef618fb1cfdff151c8c38c23a35461ea489b77bb2cf2a63446344ea789ef34
Download

Package Details

 

 

 

 

 

 

 

 

Enhancement

Description

Issue ID

Reference ID

Added the following analytics:

Alerts

  • Atlassian Confluence CVE-2022-26134 IoC Match
  • Atlassian Confluence CVE-2022-26134 Exploitation
  • DNS Query to External Service Interaction Domains

To learn more, go to UseCases Alerts.

KB-List

  • CVE_2022_26134_IPS

To learn more, go to UseCases Knowledge Base (KB) Lists.

KB-17065 -

 

Changes in the Previous Versions

Changes in UseCases v5.1.1

The application now includes:

  • New dashboard package AD PRIVILEGE ESCALATION CVE-2021-42278/87 to visualize Windows privilege escalation vulnerabilities.
  • New alert packages Computer Account Creation followed by Suspicious Rename, Suspicious Computer Account Rename followed by TGT Request, and Suspicious Kerberos S4U2self Request to detect Windows privilege escalation vulnerabilities.
Changes in UseCases v5.1.0

Enhancement

New dashboard package LP_AntiMalware and the search template LP_Antimalware has now been added to visualize the AntiMalware events.

Changes in UseCases v5.0.4

Enhancement

The LP_COBALT STRIKE dashboard package and the LP_Cobalt Strike Default Named Pipes Detected alert's query have been enhanced.

Changes in UseCases v5.0.3

Enhancement

The application now includes the dashboard package LP_COBALT STRIKE and alert packages LP_Suspicious Process Execution Without DLL, LP_CobaltStrike Process Injection Detected, LP_Meterpreter or Cobalt Strike Getsystem Service Start Detected, and LP_Suspicious Share Pattern in Service to visualize and detect the Cobalt Strike malware. Also, the LP_Cobalt Strike Default Named Pipes Detected alert's query has been enhanced.

 

Changes in UseCases v5.0.2

Enhancement

  • The application now includes the dashboard LP_Print Nightmare and alert packages LP_Printer Driver Addition Detected, LP_Printer Plugin Load Failed, and LP_Suspicious Process Spawn by Print Spooler to visualize and detect the PrintNightmare vulnerability. 
  • New widgets have been added in the LP_CEO Fraud dashboard package. 

Changes in UseCases v5.0.1

Enhancements

  • The application now includes the dashboard LP_NOBELIUM EMAIL ATTACK CAMPAIGN and the alert rule LP_NOBELIUM Email-Based Attack Detected to visualize and detect recent email-based attacks from NOBELIUM.
  • The application now includes the search templates LP_Threat Hunting and LP_Firewall, which provide an overview of threat and firewall activities respectively.
  • Some obsolete dashboards, alert rules, and reports have now been removed from the application.


Support

If you have any queries or require assistance, please feel free to contact our support team:

Email: servicedesk@logpoint.com
Phone: +45 7060 6100

Best regards,
untitled.svg

Comments

Article is closed for comments.

Follow

Related articles

  • Vade Retro AntiSpam
  • Vulnerability Management
  • Universal Normalizer
  • AWSServices
  • ChatGPT Integration
Privacy policy    EULA    Terms of service   
Copyright © , Logpoint. All rights reserved.

Note: We use cookies that are essential for the smooth functioning of our website.