n.Scope NDR v2.0 - EN
  • πŸ‘‹Welcome
  • Product Guides
    • πŸ“ŽExplore your Network
    • 🚨Using Alerts
  • Deployment
    • πŸ› οΈDeployment Guide
    • πŸ—ΊοΈn.Scope Deployment Planning
    • πŸ“‘Installing Nanocorp n.Scope
      • πŸ‘“Deploy n.Scope
      • πŸͺDeploy n.Probes, n.Rewind, n.Fusion
  • Ressources
    • πŸ”¦Alerts
      • Command & Control
        • CNC01 - Oversized UDP DNS
        • CNC02 - Protocols Ports Missmatch
        • CNC03 - BETA - Threat Intelligence Match
      • Denial of Service
        • DOS01 - DHCP Starvation
        • DOS02 - AI Smart Alert - Distributed Denial of Service
        • DOS03 - Excessive ICMP Rate
      • Exfiltration
        • EXF01 - Deprecated TLS
      • Initial Access
        • IAC01 - Suspicious SSH Admin
        • IAC02 - Unauthorized Application
        • IAC03 - Malicious TLS Signatures
      • Reconnaissance
        • REC01 - Suspicious Port Scan
        • REC02 - BETA - AI Smart Alert - Suspicious Port Sweep
      • Security Policies
        • NPC01 - Unwanted Protocol
        • NPC02 - Subnet Whitelist
        • NPC03 - Trusted Protocol
        • NPC04 - Insecure Email Protocol
        • NPC05 - Device Whitelist
    • πŸ”ŒIntegrations
      • 🚦Alerting
        • Discord
        • Slack
      • πŸ›°οΈCyber Threat Intelligence
      • πŸ”‘Single-Sign-On
        • πŸͺŸAzure AD SSO
    • πŸ€–Network Protocols
Powered by GitBook
On this page
  • What is Initial Access?
  • Supported Templates:
  1. Ressources
  2. Alerts

Initial Access

Last updated 1 year ago

What is Initial Access?

Initial Access refers to adversaries' techniques to gain an entry point into a network. Typical vectors include phishing, exploitation of public-facing applications, or using valid credentials obtained through various means. The alerts in this category are configured to detect such unauthorized access attempts by monitoring for suspicious activities that deviate from established baselines or known benign patterns. To mitigate risks associated with Initial Access, the n.Scope NDR leverages advanced analytics, threat intelligence, and behavioral modeling to provide timely and accurate alerts.

Supported Templates:

πŸ”¦
IAC01 - Suspicious SSH Admin
IAC02 - Unauthorized Application
IAC03 - Malicious TLS Signatures