Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion tm-v1-detection-models
Submodule tm-v1-detection-models updated 83 files
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Allowed Traffic to Domain Controller DC-00.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Athens Network Traffic Monitoring - Allowed Connections.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Athens to MFT Subnet Traffic Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Athens to UE Servers Allow Traffic Filter.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/B2B MFT Server to GitLab Allowed Connection.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/BOVPN Inbound Traffic Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Client Access to ManageEngine Management Platform.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Customer Support RDP Access to License Server Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/DNS Traffic Allow Rule Monitoring.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/DSTAR LDAP Authentication Traffic Permitted.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Daringstar DNS Allow Policy - Internal Network Access.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Default VLAN Unrestricted Access Policy.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Device Internet Access - Temporary Allow Rule.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/EUDC03 Domain Controller Bidirectional Firewall Access.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/External Access to DesktopCentral Management Port 8031.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/External Access to DesktopCentral Management Port Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/External Access to DesktopCentral Management Port.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/External Access to ManageEngine DesktopCentral Port 8027.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/External HTTPS Access to Redmine Application Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/External HTTPS Traffic Allowed to Kyoto Network.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/External HTTPS Traffic Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Firebox Allow Traffic to Domain Controller DC-00.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/GR Infrastructure to US Infrastructure Traffic Monitoring.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/German Traffic Allowed - DE-00 Policy.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/HTTP Proxy Traffic Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Infrastructure Internet Access Allow Rule.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Infrastructure to Lancom Network Access Permitted.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal DNS Traffic Monitoring - Allowed Connections.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Jenkins HTTPS Traffic Monitoring.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network Access to B2B MFT Servers.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network Access to Domain Controllers Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network Access to Verona Mount Points.yaml
+2 −2 ...1-sigma-rules/third_party_logs/WatchGuard/Internal Network HTTP-HTTPS Access to Redmine Server Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network HTTPS Access to Athens R&D Environment.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network HTTPS Access to GitLab Repository.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network HTTPS Traffic to Zabbix Monitoring Server.yaml
+8 −8 ...sigma-rules/third_party_logs/WatchGuard/Internal Network TCP Protocol Violations and Spoofing Attempts.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network Traffic to DE-00 Destination Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network Traffic to GR-00 Destination Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal Network to ManageEngine Access Control.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal SMTP Traffic to Internet Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Internal SSH Access to GitLab Repository Server.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/MFT DMZ to Internal Subnet Access Allow.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/MFT Infrastructure Access Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/MFT Server Infrastructure HTTPS Communication Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/MFT Server to Storage SSH Connection Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/MFT User Access to File Transfer Servers.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/MFT User HTTPS Access to Infrastructure Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/MFT User Infrastructure Access Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/NMK Infrastructure to Domain Controller Traffic Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Network Admin Full Internal Access Granted.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Network Admin Unrestricted External Access.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Network Administrator Unrestricted Access Policy.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/SMTP TLS Outgoing Traffic Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/SSL VPN Access on Port 443 Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/SSL VPN External Access Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/SSL VPN User External HTTP-HTTPS Traffic Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/STBGR41 Outbound Internet Access Allow Filter.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Server HTTP Internet Access Monitoring.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Server Internet Access Allow Events.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Server Outbound Internet Access - Unrestricted Allow Policy.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Synology Backup Traffic Allowed - Verona to Siena Network.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/TES User Internal Network Access Monitor.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/UAC Extensions User Access to UAC Tools Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/UE DEV Internal Network Allow Rule Monitoring.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/US Infrastructure Outbound Allow Traffic Monitor.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/US Traffic Allow Policy Monitor.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/US Users Internal Network Access Monitoring.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/UniFi Access Point Controller Communication Filter.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/Unrestricted Outbound Traffic from Firebox.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WatchGuard Authentication Allow Events.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WatchGuard External Packet Denial - Unhandled Traffic Block.yaml
+2 −2 ...1-sigma-rules/third_party_logs/WatchGuard/WatchGuard Firewall Allow Traffic to Dimension Any-00 Policy.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WatchGuard Infrastructure Network Internal Access Allow.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WatchGuard Internal Packet Processing Failure Detection.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WatchGuard Traffic Block - Specific Source Denial.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WatchGuard UE QA Internal Network Allow Policy Detection.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WatchGuard WiFi Network Access Policy - NMK LAN Allow Rule.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WiFi Guest Network Access Monitoring.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WiFi Portal Access Granted.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WiFi User External Access Allowed.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WiFi User Internal Network Access Allow.yaml
+2 −2 tm-v1-sigma-rules/third_party_logs/WatchGuard/WiFi User Printer Access Allowed.yaml