Initial Access

What is Initial Access?

Initial Access refers to adversaries' techniques to gain an entry point into a network. Typical vectors include phishing, exploitation of public-facing applications, or using valid credentials obtained through various means. The alerts in this category are configured to detect such unauthorized access attempts by monitoring for suspicious activities that deviate from established baselines or known benign patterns. To mitigate risks associated with Initial Access, the n.Scope NDR leverages advanced analytics, threat intelligence, and behavioral modeling to provide timely and accurate alerts.

Supported Templates:

IAC01 - Suspicious SSH AdminIAC02 - Unauthorized ApplicationIAC03 - Malicious TLS Signatures

Last updated