Detectors
New detectors
Google Drive Mass Download - Improvement
The field Application Name was added to the lead attributes as well as to the grid array.
This change will help with the investigation of this type of alert, and allow for new rules, such as ignoring rules based on known applications.
Suspicious Teams communication from foreign user
SMB Connection From an Abnormal Process
Detects abnormal processes that initiate an SMB connection.
Non-Browser User Agents Authenticating to OfficeHome
Possible Execution of Impacket
This behavior can indicate lateral movement within networks undetected and privilege escalation.
Microsoft 365 Abnormal Mail Access by Unusual ClientAppId
This may indicate potential compromise or unauthorized access attempts.
Scoring would be decreased in case multiple users usually access the target mailbox, which may indicate this is a shared mailbox.
Deprecated detectors
SOCKS proxy usage
Following customers feedback for a FP lead, we analyzed the detector at hand.
The detector attempted to identify a specific phenomenon happening during certain usage of Cobalt Strike tool. Analysis yielded this behavior is not exclusive to the tool usage.
In addition, the lead only informs for anomalous login without much context to investigate the lead.
After weighing the potential value against the time required to investigate and high amount of FPs, we decided the Detector does not meet our quality standards and should be deprecated.
Process execution from remote network share
The detector is very noisy and doesn’t necessarily indicate suspicious activity, unless there is any other indication.
The detector was replaced by a scoring model that runs on the relevant EDR-based detectors and increases score in case the target process was executed from a remote share.
Suspicious execution from %ProgramData%
The detector is very noisy and doesn’t necessarily indicate suspicious activity, unless there is any other indication.
The detector will be replaced by a scoring model that runs on the relevant EDR-based detectors and increases score in case the target process was executed from %ProgramData%.
The deprecation will take place on Nov 9, 2025.
Possible use of a stolen or forged user ticket (TGT)
The detector is very inaccurate and noisy.
The detector aims to detect a Golden Ticket attack. However, it becomes more and more common for adversaries to use more advanced techniques such as Diamond/Sapphire Ticket. Those techniques won’t be detected by the aforementioned detector.
As for now, there are no effective ways to detect Diamond/Sapphire Ticket techniques. Hunters’ Team Axon will keep evaluating possible detections for those and develop a detector if it would be possible and accurate enough.
The deprecation will take place on Nov 16, 2025.
Enrichments
EDR Process ID to Registry Operations
Scoring would be increased in case commonly abused registry keys have been modified.
Process Connections from IP over Kerberos
This drilldown identifies processes making outbound Kerberos connections (port 88) from a specific source IP address.
It's particularly useful for investigating Kerberoasting attacks, excessive TGS requests, and other Kerberos-related security incidents where understanding which processes are communicating with domain controllers is crucial.
Destination IP to Process Connections
This drilldown analyzes which processes on endpoints are connecting to specific destination IP addresses.
AWS User Role Attachment Activities
This drilldown analyzes AWS IAM policy attachment activities to identify privilege escalation attempts and unusual access patterns.
It specifically monitors AttachRolePolicy, AttachGroupPolicy, and AttachUserPolicy events to detect suspicious role and permission modifications that could indicate compromised accounts or insider threats.
Associated Microsoft Teams Activities and Complementary M365 audit logs
SentinelOne Threat Raw Correlation
SentinelOne 3rd party alerts do not contain a lot of context around the alert.
This new drilldown presents additional insights about the alerts and processes, files and network activity that are related to it.
Pulsedive IOC Lookup - Improvement
A grid array was added to the DD results including which Threats, Risk Factors or Feeds was this indicator related too.
This will enable users to immediately consume the insights of Pulsedive easily and simply
Integrations
New Integrations Releases:
Stream Security Alerts - webhook/ S3
Vectra RUX audit logs (metadata) - API /S3
Wiz Threats - Webhook/s3
Zero Networks - Audit Activity Logs - API/S3
Jamf protect Events - API/S3
Fastly Waf - S3
Tanium - audit logs (33 endpoints) - API/S3
Check Point Email Events - S3