Previous Topic: Protocol Exploit ActionNext Topic: Suspicious Filename Detected Action


Suspicious Command Detected Action

The action Suspicious Command Detected deals with IDS signature violations related to detection of Suspicious Command in the network traffic.

Information

Level

Source - User Information

Tertiary

Source - Host Information

Primary

Source - Object Information

Primary

Source - Process Information

Tertiary

Source - Group Information

Tertiary

Dest - User Information

Secondary

Dest - Host Information

Primary

Dest - Object Information

Tertiary

Dest - Process Information

Tertiary

Dest - Group Information

Tertiary

Agent - Information

Primary

Agent - Host Information

Primary

Event Source - Host Information

Primary

Event Source - Information

Tertiary

Event - Information

Primary

Result - Information

Primary

Result

event_result

event_severity

Success

S

5